Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/gplcver-2.12a/src/v_fx2.c Examining data/gplcver-2.12a/src/v_prp.c Examining data/gplcver-2.12a/src/cvmacros.h Examining data/gplcver-2.12a/src/v_src.c Examining data/gplcver-2.12a/src/veriuser.c Examining data/gplcver-2.12a/src/gpl_wrhelp.h Examining data/gplcver-2.12a/src/dig_main.c Examining data/gplcver-2.12a/src/v_prp2.c Examining data/gplcver-2.12a/src/systsks.h Examining data/gplcver-2.12a/src/v_tf.c Examining data/gplcver-2.12a/src/v_vpi.c Examining data/gplcver-2.12a/src/v_src2.c Examining data/gplcver-2.12a/src/v_del.c Examining data/gplcver-2.12a/src/v_trch.c Examining data/gplcver-2.12a/src/vpiuser.c Examining data/gplcver-2.12a/src/v_fx3.c Examining data/gplcver-2.12a/src/v_vpi3.c Examining data/gplcver-2.12a/src/v_sim.c Examining data/gplcver-2.12a/src/v_ex3.c Examining data/gplcver-2.12a/src/v_ex4.c Examining data/gplcver-2.12a/src/v_acc.c Examining data/gplcver-2.12a/src/v_vpi2.c Examining data/gplcver-2.12a/src/v_ms.c Examining data/gplcver-2.12a/src/v_cnv.c Examining data/gplcver-2.12a/src/cver.c Examining data/gplcver-2.12a/src/v_dbg.c Examining data/gplcver-2.12a/src/v_dbg2.c Examining data/gplcver-2.12a/src/v.h Examining data/gplcver-2.12a/src/v_ex2.c Examining data/gplcver-2.12a/src/v_sdf.c Examining data/gplcver-2.12a/src/v_ex.c Examining data/gplcver-2.12a/src/v_fx.c Examining data/gplcver-2.12a/src/v_src3.c Examining data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval2.c Examining data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg.c Examining data/gplcver-2.12a/tests_and_examples/examples.vpi/dfpsetd.c Examining data/gplcver-2.12a/tests_and_examples/examples.vpi/vconta1.c Examining data/gplcver-2.12a/tests_and_examples/examples.vpi/vchkprt1.c Examining data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdels.c Examining data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg2.c Examining data/gplcver-2.12a/tests_and_examples/examples.vpi/vtimcbs.c Examining data/gplcver-2.12a/tests_and_examples/examples.vpi/vdrvld2.c Examining data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c Examining data/gplcver-2.12a/tests_and_examples/examples.vpi/vhelbad.c Examining data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval1.c Examining data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetdels.c Examining data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c Examining data/gplcver-2.12a/tests_and_examples/examples.vpi/vdrvld1.c Examining data/gplcver-2.12a/tests_and_examples/examples.vpi/vhello2.c Examining data/gplcver-2.12a/tests_and_examples/examples.vpi/vhello1.c Examining data/gplcver-2.12a/tests_and_examples/examples.vpi/findcaus.c Examining data/gplcver-2.12a/tests_and_examples/examples.vpi/vfopen1.c Examining data/gplcver-2.12a/tests_and_examples/examples.vpi/async.c Examining data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdel2.c Examining data/gplcver-2.12a/tests_and_examples/examples.vpi/vfopen2.c Examining data/gplcver-2.12a/tests_and_examples/examples.acc/accxl_drvld.c Examining data/gplcver-2.12a/tests_and_examples/examples.acc/acc_probe.c Examining data/gplcver-2.12a/tests_and_examples/examples.acc/acc_nxtchld.c Examining data/gplcver-2.12a/tests_and_examples/examples.acc/acc_prtchg.c Examining data/gplcver-2.12a/tests_and_examples/examples.tf/probe.c Examining data/gplcver-2.12a/tests_and_examples/examples.tf/plimfil.c Examining data/gplcver-2.12a/tests_and_examples/examples.tf/plimfil2.c Examining data/gplcver-2.12a/tests_and_examples/examples.tf/tfclk.c Examining data/gplcver-2.12a/pli_incs/cv_veriuser.h Examining data/gplcver-2.12a/pli_incs/cv_vpi_user.h Examining data/gplcver-2.12a/pli_incs/cv_acc_user.h Examining data/gplcver-2.12a/pli_incs/vpi_user.h Examining data/gplcver-2.12a/pli_incs/acc_user.h Examining data/gplcver-2.12a/pli_incs/veriuser.h Examining data/gplcver-2.12a/vcddiff.dir/src/vcddiff.h Examining data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c FINAL RESULTS: data/gplcver-2.12a/src/cver.c:1391:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, ctime(&__end_time)); data/gplcver-2.12a/src/cver.c:1700:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, cp); data/gplcver-2.12a/src/cver.c:1748:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__pv_homedir, chp); data/gplcver-2.12a/src/cver.c:2533:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, DFLT_LOGFNAM); data/gplcver-2.12a/src/cver.c:2910:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(__xs, chp3); data/gplcver-2.12a/src/cver.c:2932:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(__xs, chp3); data/gplcver-2.12a/src/cver.c:2966:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, chp2); data/gplcver-2.12a/src/cver.c:3346:43: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if ((chp = strchr(sdfloc, '+')) == NULL) strcpy(fnam, sdfloc); data/gplcver-2.12a/src/cver.c:3355:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). { strcpy(fnam, sdfloc); goto sep_done; } data/gplcver-2.12a/src/cver.c:3364:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(pthnam, ++chp); data/gplcver-2.12a/src/cver.c:3415:45: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if ((chp2 = strchr(chp, '+')) == NULL) { strcpy(s1, chp); goto got_def; } data/gplcver-2.12a/src/cver.c:3425:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). { strcpy(s1, chp); goto got_def; } data/gplcver-2.12a/src/cver.c:3445:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(&(optnam[1]), s1); data/gplcver-2.12a/src/cver.c:3459:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(optval, chp); data/gplcver-2.12a/src/cver.c:3506:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chp2, incdirptr); data/gplcver-2.12a/src/cver.c:3590:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(rnams, cp); data/gplcver-2.12a/src/cver.c:3726:16: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). { chp2 = s2; strcpy(chp2, lbxptr); chp2[len] = '+'; chp2[len + 1] = '\0'; } data/gplcver-2.12a/src/cver.c:4953:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else { strcpy(s, mdp->msym->synam); strcat(s, "(C)"); } data/gplcver-2.12a/src/cver.c:4962:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(s, mdp->msym->synam); data/gplcver-2.12a/src/cver.c:5425:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(s1, syp->synam); data/gplcver-2.12a/src/cver.c:5449:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(s1, syp->synam); data/gplcver-2.12a/src/cver.c:5506:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(s1, imdp->msym->synam); data/gplcver-2.12a/src/cver.c:5520:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(s1, udpp->usym->synam); data/gplcver-2.12a/src/v_acc.c:614:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__acc_developmentversion, value); data/gplcver-2.12a/src/v_acc.c:688:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__acc_pathdelimstr, value); data/gplcver-2.12a/src/v_acc.c:889:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(sname, "%s%s", anam, chp); data/gplcver-2.12a/src/v_acc.c:1092:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chp, s); data/gplcver-2.12a/src/v_acc.c:1422:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s.%s", __msg2_blditree(s2, hp->hin_itp), mpp->mpsnam); data/gplcver-2.12a/src/v_acc.c:1423:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(s2, mpp->mpsnam); data/gplcver-2.12a/src/v_acc.c:1431:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s%s%s", hp->hrec->hu.hpthp->peins[0].penp->nsym->synam, data/gplcver-2.12a/src/v_acc.c:1434:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s2, "%s.%s", __msg2_blditree(s3, hp->hin_itp), s1); data/gplcver-2.12a/src/v_acc.c:1435:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(s2, s1); data/gplcver-2.12a/src/v_acc.c:1580:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s%s%s", hrp->hu.hpthp->peins[0].penp->nsym->synam, data/gplcver-2.12a/src/v_acc.c:3040:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s1, "%s", vpi_get_str(vpiName, scoph)); data/gplcver-2.12a/src/v_acc.c:3469:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s", vpi_get_str(vpiName, (vpiHandle) shp2)); data/gplcver-2.12a/src/v_acc.c:3585:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s%s of %s\n", __vers, __vers2, __ofdt); data/gplcver-2.12a/src/v_acc.c:3589:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__acc_developmentversion, s1); data/gplcver-2.12a/src/v_acc.c:3604:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__acc_pathdelimstr, s1); data/gplcver-2.12a/src/v_acc.c:6309:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s%s of %s (%s).\n", __vers, __vers2, __ofdt, __platform); data/gplcver-2.12a/src/v_acc.c:6310:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s2, "Cver Verilog simulator Version %s", s1); data/gplcver-2.12a/src/v_acc.c:7715:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "acc_ access routines Version %s%s of %s\n", __vers, data/gplcver-2.12a/src/v_acc.c:8044:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, accconfig_names[i].vpipropnam); data/gplcver-2.12a/src/v_acc.c:8313:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s2, s1); data/gplcver-2.12a/src/v_acc.c:8330:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s2, s1); data/gplcver-2.12a/src/v_acc.c:8417:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, get_accnam(accoval)); data/gplcver-2.12a/src/v_acc.c:8472:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, " now %s", __to_timstr(s2, &__simtime)); data/gplcver-2.12a/src/v_acc.c:8483:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(vpis1, "**%s(%d) ACC PLI ERROR**%s [%d] ", __in_fils[__sfnam_ind], data/gplcver-2.12a/src/v_acc.c:8486:4: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(vpis2, vpis1, va); data/gplcver-2.12a/src/v_acc.c:8491:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vpichp, vpis1); data/gplcver-2.12a/src/v_acc.c:8492:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(vpichp, vpis2); data/gplcver-2.12a/src/v_acc.c:8533:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, " now %s", __to_timstr(s2, &__simtime)); data/gplcver-2.12a/src/v_acc.c:8544:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(vpis1, "**ACC PLI ERROR**%s [%d] ", s1, id_num); data/gplcver-2.12a/src/v_acc.c:8546:4: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(vpis2, vpis1, va); data/gplcver-2.12a/src/v_acc.c:8551:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vpichp, vpis1); data/gplcver-2.12a/src/v_acc.c:8552:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(vpichp, vpis2); data/gplcver-2.12a/src/v_acc.c:8590:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, " now %s", __to_timstr(s2, &__simtime)); data/gplcver-2.12a/src/v_acc.c:8601:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(vpis1, "**%s(%d) ACC PLI WARN**%s [%d] ", __in_fils[__sfnam_ind], data/gplcver-2.12a/src/v_acc.c:8604:4: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(vpis2, vpis1, va); data/gplcver-2.12a/src/v_acc.c:8609:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vpichp, vpis1); data/gplcver-2.12a/src/v_acc.c:8610:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(vpichp, vpis2); data/gplcver-2.12a/src/v_acc.c:8650:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, " now %s", __to_timstr(s2, &__simtime)); data/gplcver-2.12a/src/v_acc.c:8661:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(vpis1, "**ACC PLI WARN**%s [%d] ", s1, id_num); data/gplcver-2.12a/src/v_acc.c:8663:4: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(vpis2, vpis1, va); data/gplcver-2.12a/src/v_acc.c:8668:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vpichp, vpis1); data/gplcver-2.12a/src/v_acc.c:8669:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(vpichp, vpis2); data/gplcver-2.12a/src/v_cnv.c:492:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s.%s", mdp->mod_cfglbp->lbname, mdp->msym->synam); data/gplcver-2.12a/src/v_cnv.c:496:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "[NO-CONFIG].%s", mdp->msym->synam); data/gplcver-2.12a/src/v_cnv.c:621:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%%%s%c", rfmtstr, *chp); data/gplcver-2.12a/src/v_cnv.c:625:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(s2, s1, d1); data/gplcver-2.12a/src/v_cnv.c:852:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, &(__exprline[sav_sofs])); data/gplcver-2.12a/src/v_cnv.c:1229:23: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). if (__nd_timstr_suf) strcat(s, __timstr_unitsuf); data/gplcver-2.12a/src/v_cnv.c:1310:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "%*.*f%s", (int32) (__tfmt_minfwid - strlen(__tfmt_suf)), data/gplcver-2.12a/src/v_cnv.c:1313:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s, "%.*f%s", (int32) __tfmt_precunits, d1, __tfmt_suf); data/gplcver-2.12a/src/v_cnv.c:1409:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chp, &(__exprline[sav_sofs])); data/gplcver-2.12a/src/v_cnv.c:1533:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, &(__exprline[sav_sofs])); data/gplcver-2.12a/src/v_cnv.c:1552:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, &(__exprline[sav_sofs])); data/gplcver-2.12a/src/v_cnv.c:1738:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chp, &(__exprline[sav_sofs])); data/gplcver-2.12a/src/v_cnv.c:1806:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, &(__exprline[sav_sofs])); data/gplcver-2.12a/src/v_cnv.c:1855:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, &(__exprline[sav_sofs])); data/gplcver-2.12a/src/v_cnv.c:1963:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s1, &(__exprline[__cur_sofs - newsize - 3])); data/gplcver-2.12a/src/v_cnv.c:1964:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__exprline, s1); data/gplcver-2.12a/src/v_cnv.c:1994:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s1, &(s[slen - newsize - 3 - 1])); data/gplcver-2.12a/src/v_cnv.c:1995:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, s1); data/gplcver-2.12a/src/v_cnv.c:2090:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, &(__exprline[sav_sofs])); data/gplcver-2.12a/src/v_cnv.c:2106:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, &(__exprline[sav_sofs])); data/gplcver-2.12a/src/v_cnv.c:2156:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, &(__exprline[sav_sofs])); data/gplcver-2.12a/src/v_cnv.c:2190:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, &(__exprline[sav_sofs])); data/gplcver-2.12a/src/v_cnv.c:2206:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, &(__exprline[sav_sofs])); data/gplcver-2.12a/src/v_cnv.c:2231:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, &(__exprline[sav_sofs])); data/gplcver-2.12a/src/v_cnv.c:2566:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s3, "(IN=%s)", tmp_mdp->msym->synam); break; data/gplcver-2.12a/src/v_cnv.c:2569:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s3, "(XMR %s mod=%s)", npauxp->npu.npgrp->gnam, data/gplcver-2.12a/src/v_cnv.c:2575:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s3, "(INST-LOC=%s(%s))", __msg2_blditree(__xs, itp), data/gplcver-2.12a/src/v_cnv.c:2711:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, " %s (first instance old value %s)", data/gplcver-2.12a/src/v_cnv.c:3538:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "\n`timescale %s / %s", __to_timunitnam(__xs, __cur_units), data/gplcver-2.12a/src/v_cnv.c:4272:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, ip->isym->synam); data/gplcver-2.12a/src/v_cnv.c:4278:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(s1, ip->isym->synam); data/gplcver-2.12a/src/v_cnv.c:4289:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, gp->gsym->synam); data/gplcver-2.12a/src/v_cnv.c:4295:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(s1, gp->gsym->synam); data/gplcver-2.12a/src/v_cnv.c:4680:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, data/gplcver-2.12a/src/v_cnv.c:4813:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "function %s ", ftyp); data/gplcver-2.12a/src/v_cnv.c:4885:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s3, " %s%s ", __to_ptnam(s2, tpp->trtyp), s1); data/gplcver-2.12a/src/v_cnv.c:4901:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s3, " %s%s ", __to_wtnam(s2, regp), s1); data/gplcver-2.12a/src/v_cnv.c:4935:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s3, "%s%s ", __to_ptnam(s2, tpp->trtyp), s1); data/gplcver-2.12a/src/v_cnv.c:5178:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "<target %s", grp->targmdp->msym->synam); data/gplcver-2.12a/src/v_cnv.c:5183:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, " in %s %s", __to_sytyp(s2, syp->sytyp), syp->synam); data/gplcver-2.12a/src/v_cnv.c:5184:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s, s1); data/gplcver-2.12a/src/v_cnv.c:5186:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, " %s)", __bld_lineloc(s2, grp->grfnam_ind, grp->grflin_cnt)); data/gplcver-2.12a/src/v_cnv.c:5187:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s, s1); data/gplcver-2.12a/src/v_cnv.c:5912:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(&(__exprline[__cur_sofs]), s); data/gplcver-2.12a/src/v_cnv.c:6015:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(&(__exprline[__cur_sofs]), s); data/gplcver-2.12a/src/v_dbg.c:697:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__iahwrkline, __iahtab[histcmd_num].iah_lp); data/gplcver-2.12a/src/v_dbg.c:1516:25: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (*argchp == '\0') execl(usersh, chp, (char *) 0); data/gplcver-2.12a/src/v_dbg.c:1517:9: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. else execl(usersh, chp, "-c", argchp, (char *) 0); data/gplcver-2.12a/src/v_dbg.c:1813:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, ":%s", __prt_vtok()); data/gplcver-2.12a/src/v_dbg.c:1820:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s1, __token); data/gplcver-2.12a/src/v_dbg.c:2090:24: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (first_time) { strcpy(s, cmdtab[i].lnam); first_time = FALSE; } data/gplcver-2.12a/src/v_dbg.c:2091:30: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). else { strcat(s, ", "); strcat(s, cmdtab[i].lnam); } data/gplcver-2.12a/src/v_dbg.c:2904:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s1, __token); data/gplcver-2.12a/src/v_dbg.c:3082:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "char: [%s]", s1); data/gplcver-2.12a/src/v_dbg.c:3296:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, s); data/gplcver-2.12a/src/v_dbg.c:3297:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "%s #%d", s1, prtwidth); data/gplcver-2.12a/src/v_dbg.c:3326:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "<top operator %s width %d", __to_opname(xp->optyp), data/gplcver-2.12a/src/v_dbg.c:3395:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s %s", __to_sytyp(s2, syp->sytyp), syp->synam); data/gplcver-2.12a/src/v_dbg.c:3402:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s %s", __to_sytyp(s2, syp->sytyp), syp->synam); data/gplcver-2.12a/src/v_dbg.c:3411:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s %s", __to_sytyp(s2, syp->sytyp), syp->synam); data/gplcver-2.12a/src/v_dbg2.c:55:14: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. extern int32 sscanf(char *, char *, ...); data/gplcver-2.12a/src/v_dbg2.c:1307:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, chp); data/gplcver-2.12a/src/v_dbg2.c:1865:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s1, " %s: %s", __to_tsktyp(__xs, bpp->bp_tskp->tsktyp), data/gplcver-2.12a/src/v_dbg2.c:3488:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s1, " %s", __to_tsktyp(s2, tskp->tsktyp)); data/gplcver-2.12a/src/v_dbg2.c:3613:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs, "waiting for repeat count events (now %s)\n", data/gplcver-2.12a/src/v_dbg2.c:3616:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(__xs, "assign at %s\n", __to_timstr(__xs2, &(tevp->etime))); data/gplcver-2.12a/src/v_dbg2.c:3951:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s action at %s", __to_dcenam(s2, dctp->dctyp), data/gplcver-2.12a/src/v_dbg2.c:3953:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s1, "%s no action", __to_dcenam(s2, dctp->dctyp)); data/gplcver-2.12a/src/v_del.c:2483:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "%s", __to_timstr(s1, &(tim[0]))); data/gplcver-2.12a/src/v_del.c:2486:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "%s, %s, %s", __to_timstr(s1, &(tim[0])), data/gplcver-2.12a/src/v_del.c:2492:20: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (i == 0) { sprintf(s, "%s", __to_timstr(s1, &(tim[0]))); continue; } data/gplcver-2.12a/src/v_del.c:2493:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, ", %s", __to_timstr(s2, &(tim[i]))); data/gplcver-2.12a/src/v_del.c:2494:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s, s1); data/gplcver-2.12a/src/v_del.c:2498:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "**EXPR: %s", __to_timstr(s1, &(tim[0]))); break; data/gplcver-2.12a/src/v_del.c:2502:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "**EXPR: %s, %s, %s", __to_timstr(s1, &(tim[0])), data/gplcver-2.12a/src/v_del.c:2507:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "**EXPR: %s, %s", __to_timstr(s1, &(tim[0])), data/gplcver-2.12a/src/v_ex.c:3250:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs2, "%d'h%s", xsp->xslen, __regab_tostr(__xs, xsp->ap, data/gplcver-2.12a/src/v_ex.c:5312:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs2, "at %s", __bld_lineloc(__xs, stp->stfnam_ind, data/gplcver-2.12a/src/v_ex.c:5883:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs, "%s: ", __to_tsktyp(__xs2, tskp->tsktyp)); data/gplcver-2.12a/src/v_ex.c:5905:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs, "%s: ", __to_tsktyp(__xs2, tskp->tsktyp)); data/gplcver-2.12a/src/v_ex.c:6620:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, ") is %s / %s\n", data/gplcver-2.12a/src/v_ex.c:7097:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(os_mode, ver_mode); data/gplcver-2.12a/src/v_ex3.c:2969:27: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (__showe_onevent) sprintf(s1, "%s (on event)", __to_timstr(__xs, data/gplcver-2.12a/src/v_ex3.c:2971:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s1, "%s (on detect)", __to_timstr(__xs, &__simtime)); data/gplcver-2.12a/src/v_ex3.c:3017:25: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (__showe_onevent) sprintf(s2, "%s (on event)", __to_timstr(__xs, data/gplcver-2.12a/src/v_ex3.c:3019:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s2, "%s (on detect)", __to_timstr(__xs, &__simtime)); data/gplcver-2.12a/src/v_ex3.c:3090:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s2, "old %s, scheduled %s, new %s%s", data/gplcver-2.12a/src/v_ex3.c:3095:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. { sprintf(s6, "(edge at %s removed)", __to_timstr(__xs2, etim)); } data/gplcver-2.12a/src/v_ex3.c:3098:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s6, "(edge at %s replaced by new at %s)", data/gplcver-2.12a/src/v_ex3.c:3124:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s2, "old %s, scheduled %s, new %s%s", data/gplcver-2.12a/src/v_ex3.c:3128:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "(edge at %s removed)", __to_timstr(__xs2, etim)); data/gplcver-2.12a/src/v_ex3.c:3130:20: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (np->n_isavec) sprintf(s6, "%s %s[%d]", __to_ptnam(__xs, np->iotyp), data/gplcver-2.12a/src/v_ex3.c:3132:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s6, "%s %s", __to_ptnam(__xs, np->iotyp), np->nsym->synam); data/gplcver-2.12a/src/v_ex4.c:747:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s2, "%s bit %d", __to_mpnam(s3, mpp->mpsnam), pbi); data/gplcver-2.12a/src/v_ex4.c:762:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s3, "%s bit %d", __to_mpnam(s4, mpp->mpsnam), pbi); data/gplcver-2.12a/src/v_ex4.c:3550:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, &(__exprline[sav_sofs])); data/gplcver-2.12a/src/v_ex4.c:3799:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s2, "%s udp %s", __schop(__xs, gp->gmsym->synam), data/gplcver-2.12a/src/v_ex4.c:3805:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s2, "%s gate %s", __schop(__xs, gp->gmsym->synam), data/gplcver-2.12a/src/v_ex4.c:4143:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "(scheduled %s at %s)", s1, __to_timstr(s2, &(tevp->etime))); data/gplcver-2.12a/src/v_ex4.c:4156:27: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (np->iotyp != NON_IO) sprintf(s1, " %s", __to_ptnam(s3, np->iotyp)); data/gplcver-2.12a/src/v_ex4.c:4159:26: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. && np->ntyp != N_REAL) sprintf(s2, " %s", __to_wrange(s3, np)); data/gplcver-2.12a/src/v_ex4.c:4161:19: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. if (np->n_isarr) sprintf(s4, __to_arr_range(s3, np)); else strcpy(s4, ""); data/gplcver-2.12a/src/v_ex4.c:4165:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "%s%s %s%s %s", s1, s2, s3, s4, bld_wire_telltale(s5, np)); data/gplcver-2.12a/src/v_ex4.c:4178:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "<%s", __to_wtnam(s1, np)); data/gplcver-2.12a/src/v_ex4.c:4190:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, " %s capacitor", __to1_stren_nam(s2, data/gplcver-2.12a/src/v_ex4.c:4192:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s, s1); data/gplcver-2.12a/src/v_ex4.c:4551:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs2, "$date\n %s\n$end\n", __pv_timestamp); data/gplcver-2.12a/src/v_ex4.c:4555:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs2, "$version\n %s%s of %s\n$end\n", __vers, __vers2, __ofdt); data/gplcver-2.12a/src/v_ex4.c:4560:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs2, "$timescale\n %s\n$end\n", __to_timunitnam(__xs, data/gplcver-2.12a/src/v_ex4.c:4751:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(&(mdp->mndvcodtab[jj]), to_dvcode(s1, __next_dvnum + ii)); data/gplcver-2.12a/src/v_ex4.c:4864:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs2, "$scope module %s $end\n", itp->itip->isym->synam); data/gplcver-2.12a/src/v_ex4.c:4941:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs2, "$scope module %s $end\n", down_itp->itip->isym->synam); data/gplcver-2.12a/src/v_ex4.c:5003:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs2, "$scope %s %s $end\n", to_dvtsktyp(__xs, tskp->tsktyp), data/gplcver-2.12a/src/v_ex4.c:5059:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs2, "$scope module %s $end\n", __inst_ptr->itip->isym->synam); data/gplcver-2.12a/src/v_ex4.c:5091:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs2, "$scope %s %s $end\n", to_dvtsktyp(__xs, tskp->tsktyp), data/gplcver-2.12a/src/v_ex4.c:5128:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs2, "$var %s ", __to_wtnam2(s1, np->ntyp)); data/gplcver-2.12a/src/v_ex4.c:5135:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs2, " 64 %-4s %s $end\n", dvcod, np->nsym->synam); data/gplcver-2.12a/src/v_ex4.c:5140:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs2, "%7d %-4s %s [%d:%d] $end\n", np->nwid, dvcod, data/gplcver-2.12a/src/v_ex4.c:5148:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs2, "$var %s ", __to_wtnam2(s1, np->ntyp)); data/gplcver-2.12a/src/v_ex4.c:5151:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs2, " 1 %-4s %s $end\n", dvcod, np->nsym->synam); data/gplcver-2.12a/src/v_ex4.c:5279:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs2, "#%s\n", to_dvtimstr(__xs, __simtime)); data/gplcver-2.12a/src/v_ex4.c:5426:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs2, "#%s\n", to_dvtimstr(__xs, __simtime)); data/gplcver-2.12a/src/v_ex4.c:5436:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs2, data/gplcver-2.12a/src/v_ex4.c:5497:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs2, "#%s\n", to_dvtimstr(__xs, __simtime)); data/gplcver-2.12a/src/v_fx.c:692:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(stem, "%s/", vyp->vyu.vydirpth); data/gplcver-2.12a/src/v_fx.c:714:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fnam, "%s%s", undefp->msyp->synam, __lbexts[lbxi]); data/gplcver-2.12a/src/v_fx.c:736:28: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (__last_lbx == -1) sprintf(fnam, "%s%s", stem, undefp->msyp->synam); data/gplcver-2.12a/src/v_fx.c:740:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fnam, "%s%s%s", stem, undefp->msyp->synam, __lbexts[lbxi]); data/gplcver-2.12a/src/v_fx.c:952:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(savtoken, __token); data/gplcver-2.12a/src/v_fx.c:1007:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(savtoken, __token); data/gplcver-2.12a/src/v_fx.c:1249:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(stem, "%s/", vyp->vyu.vydirpth); data/gplcver-2.12a/src/v_fx.c:1269:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fnam, "%s%s", undefp->msyp->synam, __lbexts[lbxi]); data/gplcver-2.12a/src/v_fx.c:1294:28: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (__last_lbx == -1) sprintf(fnam, "%s%s", stem, undefp->msyp->synam); data/gplcver-2.12a/src/v_fx.c:1298:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fnam, "%s%s%s", stem, undefp->msyp->synam, __lbexts[lbxi]); data/gplcver-2.12a/src/v_fx.c:2005:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "instance %s", ip->isym->synam); data/gplcver-2.12a/src/v_fx.c:2153:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "instance %s", ip->isym->synam); data/gplcver-2.12a/src/v_fx.c:3796:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s (pound param)", __msg2_blditree(__xs, itp)); data/gplcver-2.12a/src/v_fx.c:4119:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(nsynam, "%s[%d]", gp->gsym->synam, bi); data/gplcver-2.12a/src/v_fx.c:4137:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(nsynam, "%s[%d]", ip->isym->synam, bi); data/gplcver-2.12a/src/v_fx.c:4174:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "ipxprtab[0]=%s", __msgexpr_tostr(__xs, ip->ipxprtab[0])); data/gplcver-2.12a/src/v_fx.c:5613:8: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s1, s2); data/gplcver-2.12a/src/v_fx.c:5632:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, chp); data/gplcver-2.12a/src/v_fx.c:6201:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s$$%d", smdp->msym->synam, smdp->mversno); data/gplcver-2.12a/src/v_fx2.c:482:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs, " (inst type %s)", ip->imsym->synam); data/gplcver-2.12a/src/v_fx2.c:1400:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s (pound param)", __msg2_blditree(__xs, itp)); data/gplcver-2.12a/src/v_fx2.c:1411:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s (pound param)", __msg2_blditree(__xs, itp)); data/gplcver-2.12a/src/v_fx2.c:1418:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s (per instance pound param)", __msg2_blditree(__xs, itp)); data/gplcver-2.12a/src/v_fx2.c:1685:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "defparam in %s at %s", imdp->msym->synam, data/gplcver-2.12a/src/v_fx2.c:4455:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "wire or reg first range of %s", np->nsym->synam); data/gplcver-2.12a/src/v_fx2.c:4471:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "wire or reg second range of %s", np->nsym->synam); data/gplcver-2.12a/src/v_fx2.c:4533:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "array first range of %s", np->nsym->synam); data/gplcver-2.12a/src/v_fx2.c:4548:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "array second range of %s", np->nsym->synam); data/gplcver-2.12a/src/v_fx2.c:6329:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s [%d:%d] %s at %s", data/gplcver-2.12a/src/v_fx3.c:363:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "parameter %s select index", selnam); data/gplcver-2.12a/src/v_fx3.c:2964:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "array index of %s", np->nsym->synam); data/gplcver-2.12a/src/v_fx3.c:2970:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "register bit select of %s", np->nsym->synam); data/gplcver-2.12a/src/v_fx3.c:2979:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "wire bit select of %s", np->nsym->synam); data/gplcver-2.12a/src/v_fx3.c:3142:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "1st part select index of %s", np->nsym->synam); data/gplcver-2.12a/src/v_fx3.c:3144:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "2nd part select index of %s", np->nsym->synam); data/gplcver-2.12a/src/v_fx3.c:3164:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "1st part select index of %s", np->nsym->synam); data/gplcver-2.12a/src/v_fx3.c:3167:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "2nd part select index of %s", np->nsym->synam); data/gplcver-2.12a/src/v_fx3.c:6017:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "(%s %s %s)", pthel_tostr(s2, pep1), s1, pthel_tostr(s3, pep2)); data/gplcver-2.12a/src/v_fx3.c:6026:24: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (pep->pthi1 == -1) strcpy(s, pep->penp->nsym->synam); data/gplcver-2.12a/src/v_fx3.c:6027:37: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else if (pep->pthi1 == pep->pthi2) sprintf(s, "%s[%d]", data/gplcver-2.12a/src/v_fx3.c:6029:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s, "%s[%d:%d]", pep->penp->nsym->synam, pep->pthi1, pep->pthi2); data/gplcver-2.12a/src/v_fx3.c:6349:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, " %s timing check", __to_tcnam(s2, tcp->tchktyp)); data/gplcver-2.12a/src/v_ms.c:299:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__token, __lasttoken); data/gplcver-2.12a/src/v_ms.c:401:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__xs, __token); data/gplcver-2.12a/src/v_ms.c:404:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else { strcpy(&(__xs[1]), __token); __xs[0] = '`'; } data/gplcver-2.12a/src/v_ms.c:714:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chp2, __macwrkstr); data/gplcver-2.12a/src/v_ms.c:764:37: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). if (!has_err) { strcpy(dnam, "`"); strcat(dnam, __token); } data/gplcver-2.12a/src/v_ms.c:870:37: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). if (!has_err) { strcpy(dnam, "`"); strcat(dnam, __token); } data/gplcver-2.12a/src/v_ms.c:1222:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mchp, newwrkstr); data/gplcver-2.12a/src/v_ms.c:1567:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(incfnam, &(cp[1])); data/gplcver-2.12a/src/v_ms.c:1584:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chp, __incdirs[idi]); data/gplcver-2.12a/src/v_ms.c:1585:10: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(chp, incfnam); data/gplcver-2.12a/src/v_ms.c:1592:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(incpth, __incdirs[idi]); data/gplcver-2.12a/src/v_ms.c:1593:8: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(incpth, incfnam); data/gplcver-2.12a/src/v_ms.c:1598:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). { strcpy(incfnam, incpth); goto found_path; } data/gplcver-2.12a/src/v_ms.c:2510:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, &(__token[1])); data/gplcver-2.12a/src/v_ms.c:2513:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__token, s1); data/gplcver-2.12a/src/v_ms.c:2608:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__lasttoken, __token); data/gplcver-2.12a/src/v_ms.c:2746:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__numtoken, nwidtoken); data/gplcver-2.12a/src/v_ms.c:3515:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "Verilog keyword: %s", __prt_vtok()); data/gplcver-2.12a/src/v_ms.c:3516:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__pv_varnam, s1); data/gplcver-2.12a/src/v_ms.c:3766:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, vkeywds[vi].vknam); data/gplcver-2.12a/src/v_ms.c:4436:16: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). case CFG_ID: strcpy(s, __token); break; data/gplcver-2.12a/src/v_ms.c:4613:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cp, s); data/gplcver-2.12a/src/v_ms.c:4938:48: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (chp == NULL) strcpy(s, "*unnamed*"); else strcpy(s, chp); data/gplcver-2.12a/src/v_ms.c:5065:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "(%s)", __to1_stren_nam(s1, stren1, 2)); data/gplcver-2.12a/src/v_ms.c:5066:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s, "(%s, %s)", __to1_stren_nam(s1, stren1, 0), data/gplcver-2.12a/src/v_ms.c:5083:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "(%s, %s)", __to1_stren_nam(s1, st0, 0), data/gplcver-2.12a/src/v_ms.c:5316:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "bit change(%s)", __to_nppsubtyp(s1, npp->chgsubtyp)); data/gplcver-2.12a/src/v_ms.c:5431:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "%d'%c%s", width, __to_baselet(base), digs); data/gplcver-2.12a/src/v_ms.c:5709:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cp, s); data/gplcver-2.12a/src/v_ms.c:5926:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chp, chp2); data/gplcver-2.12a/src/v_ms.c:5927:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(&(chp[hlen]), &(pthnam[1])); data/gplcver-2.12a/src/v_ms.c:6009:40: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (slen < (sendi = MSGTRUNCLEN - 4)) strcpy(s1, s2); data/gplcver-2.12a/src/v_ms.c:6023:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "**%s(%d)", __schop(s1, __in_fils[fnind]), fnlcnt); data/gplcver-2.12a/src/v_ms.c:6043:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stdout, s, va); data/gplcver-2.12a/src/v_ms.c:6044:23: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if (__log_s != NULL) vfprintf(__log_s, s, va2); data/gplcver-2.12a/src/v_ms.c:6065:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stdout, s, va); data/gplcver-2.12a/src/v_ms.c:6066:23: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if (__log_s != NULL) vfprintf(__log_s, s, va2); data/gplcver-2.12a/src/v_ms.c:6084:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stdout, s, va); data/gplcver-2.12a/src/v_ms.c:6085:23: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if (__log_s != NULL) vfprintf(__log_s, s, va2); data/gplcver-2.12a/src/v_ms.c:6104:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stdout, s, va); data/gplcver-2.12a/src/v_ms.c:6105:23: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if (__log_s != NULL) vfprintf(__log_s, s, va2); data/gplcver-2.12a/src/v_ms.c:6124:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stdout, s, va); data/gplcver-2.12a/src/v_ms.c:6125:23: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if (__log_s != NULL) vfprintf(__log_s, s, va2); data/gplcver-2.12a/src/v_ms.c:6145:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stdout, s, va); data/gplcver-2.12a/src/v_ms.c:6146:23: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if (__log_s != NULL) vfprintf(__log_s, s, va2); data/gplcver-2.12a/src/v_ms.c:6160:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stdout, s, va); data/gplcver-2.12a/src/v_ms.c:6177:23: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if (__log_s != NULL) vfprintf(__log_s, s, va); data/gplcver-2.12a/src/v_ms.c:6210:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(__tr_s, s, va); data/gplcver-2.12a/src/v_ms.c:6211:43: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if (__tr_s == stdout && __log_s != NULL) vfprintf(__log_s, s, va2); data/gplcver-2.12a/src/v_ms.c:6303:4: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(vpis2, s, va); data/gplcver-2.12a/src/v_ms.c:6308:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vpichp, vpis1); data/gplcver-2.12a/src/v_ms.c:6309:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(vpichp, vpis2); data/gplcver-2.12a/src/v_ms.c:6351:4: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(vpis2, s, va); data/gplcver-2.12a/src/v_ms.c:6356:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vpichp, vpis1); data/gplcver-2.12a/src/v_ms.c:6357:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(vpichp, vpis2); data/gplcver-2.12a/src/v_ms.c:6392:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(vpis1, "**%s(%d) FATAL ERROR** [%d] ", __cur_fnam, data/gplcver-2.12a/src/v_ms.c:6395:4: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(vpis2, s, va); data/gplcver-2.12a/src/v_ms.c:6400:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vpichp, vpis1); data/gplcver-2.12a/src/v_ms.c:6401:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(vpichp, vpis2); data/gplcver-2.12a/src/v_ms.c:6434:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, " now %s", __to_timstr(s2, &__simtime)); data/gplcver-2.12a/src/v_ms.c:6442:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(vpis1, "**%s(%d) FATAL ERROR**%s [%d] ", __in_fils[__sfnam_ind], data/gplcver-2.12a/src/v_ms.c:6445:4: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(vpis2, s, va); data/gplcver-2.12a/src/v_ms.c:6450:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vpichp, vpis1); data/gplcver-2.12a/src/v_ms.c:6451:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(vpichp, vpis2); data/gplcver-2.12a/src/v_ms.c:6486:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, " now %s", __to_timstr(s2, &__simtime)); data/gplcver-2.12a/src/v_ms.c:6494:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(vpis1, "**%s(%d) FATAL ERROR**%s [%d] ", data/gplcver-2.12a/src/v_ms.c:6497:4: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(vpis2, s, va); data/gplcver-2.12a/src/v_ms.c:6502:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vpichp, vpis1); data/gplcver-2.12a/src/v_ms.c:6503:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(vpichp, vpis2); data/gplcver-2.12a/src/v_ms.c:6548:6: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(vpis2, s, va); data/gplcver-2.12a/src/v_ms.c:6553:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vpichp, vpis1); data/gplcver-2.12a/src/v_ms.c:6554:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(vpichp, vpis2); data/gplcver-2.12a/src/v_ms.c:6607:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(vpis1, "**%s(%d) ERROR** [%d] ", __cur_fnam, __lin_cnt, id_num); data/gplcver-2.12a/src/v_ms.c:6609:6: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(vpis2, s, va); data/gplcver-2.12a/src/v_ms.c:6614:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vpichp, vpis1); data/gplcver-2.12a/src/v_ms.c:6615:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(vpichp, vpis2); data/gplcver-2.12a/src/v_ms.c:6653:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, " now %s", __to_timstr(s2, &__simtime)); data/gplcver-2.12a/src/v_ms.c:6661:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(vpis1, "**%s(%d) ERROR**%s [%d] ", __in_fils[__sfnam_ind], data/gplcver-2.12a/src/v_ms.c:6664:6: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(vpis2, s, va); data/gplcver-2.12a/src/v_ms.c:6669:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vpichp, vpis1); data/gplcver-2.12a/src/v_ms.c:6670:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(vpichp, vpis2); data/gplcver-2.12a/src/v_ms.c:6711:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, " now %s", __to_timstr(s2, &__simtime)); data/gplcver-2.12a/src/v_ms.c:6719:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(vpis1, "**%s(%d) ERROR**%s [%d] ", __in_fils[gfnam_ind], data/gplcver-2.12a/src/v_ms.c:6723:6: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(vpis2, s, va); data/gplcver-2.12a/src/v_ms.c:6728:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vpichp, vpis1); data/gplcver-2.12a/src/v_ms.c:6729:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(vpichp, vpis2); data/gplcver-2.12a/src/v_ms.c:6805:4: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(vpis2, s, va); data/gplcver-2.12a/src/v_ms.c:6810:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vpichp, vpis1); data/gplcver-2.12a/src/v_ms.c:6811:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(vpichp, vpis2); data/gplcver-2.12a/src/v_ms.c:6859:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(vpis1, "**%s(%d) WARN** [%d] ", __cur_fnam, __lin_cnt, id_num); data/gplcver-2.12a/src/v_ms.c:6861:4: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(vpis2, s, va); data/gplcver-2.12a/src/v_ms.c:6866:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vpichp, vpis1); data/gplcver-2.12a/src/v_ms.c:6867:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(vpichp, vpis2); data/gplcver-2.12a/src/v_ms.c:6901:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, " now %s", __to_timstr(s2, &__simtime)); data/gplcver-2.12a/src/v_ms.c:6909:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(vpis1, "**%s(%d) WARN**%s [%d] ", __in_fils[__sfnam_ind], data/gplcver-2.12a/src/v_ms.c:6913:4: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(vpis2, s, va); data/gplcver-2.12a/src/v_ms.c:6918:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vpichp, vpis1); data/gplcver-2.12a/src/v_ms.c:6919:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(vpichp, vpis2); data/gplcver-2.12a/src/v_ms.c:6956:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, " now %s", __to_timstr(s2, &__simtime)); data/gplcver-2.12a/src/v_ms.c:6964:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(vpis1, "**%s(%d) WARN**%s [%d] ", __in_fils[gfnam_ind], data/gplcver-2.12a/src/v_ms.c:6968:4: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(vpis2, s, va); data/gplcver-2.12a/src/v_ms.c:6973:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vpichp, vpis1); data/gplcver-2.12a/src/v_ms.c:6974:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(vpichp, vpis2); data/gplcver-2.12a/src/v_ms.c:7047:4: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(vpis2, s, va); data/gplcver-2.12a/src/v_ms.c:7052:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vpichp, vpis1); data/gplcver-2.12a/src/v_ms.c:7053:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(vpichp, vpis2); data/gplcver-2.12a/src/v_ms.c:7090:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(vpis1, "--%s(%d) INFORM-- [%d] ", __cur_fnam, __lin_cnt, id_num); data/gplcver-2.12a/src/v_ms.c:7092:4: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(vpis2, s, va); data/gplcver-2.12a/src/v_ms.c:7097:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vpichp, vpis1); data/gplcver-2.12a/src/v_ms.c:7098:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(vpichp, vpis2); data/gplcver-2.12a/src/v_ms.c:7133:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, " now %s", __to_timstr(s2, &__simtime)); data/gplcver-2.12a/src/v_ms.c:7141:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(vpis1, "--%s(%d) INFORM--%s [%d] ", __in_fils[__sfnam_ind], data/gplcver-2.12a/src/v_ms.c:7144:4: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(vpis2, s, va); data/gplcver-2.12a/src/v_ms.c:7149:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vpichp, vpis1); data/gplcver-2.12a/src/v_ms.c:7150:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(vpichp, vpis2); data/gplcver-2.12a/src/v_ms.c:7187:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, " now %s", __to_timstr(s2, &__simtime)); data/gplcver-2.12a/src/v_ms.c:7195:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(vpis1, "--%s(%d) INFORM--%s [%d] ", __in_fils[gfnam_ind], data/gplcver-2.12a/src/v_ms.c:7198:4: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(vpis2, s, va); data/gplcver-2.12a/src/v_ms.c:7203:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(vpichp, vpis1); data/gplcver-2.12a/src/v_ms.c:7204:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(vpichp, vpis2); data/gplcver-2.12a/src/v_ms.c:7256:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(f, s, va); data/gplcver-2.12a/src/v_ms.c:7257:38: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if (f == stdout && __log_s != NULL) vfprintf(__log_s, s, va2); data/gplcver-2.12a/src/v_ms.c:7269:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(f, s, args); data/gplcver-2.12a/src/v_ms.c:7270:38: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if (f == stdout && __log_s != NULL) vfprintf(__log_s, s, args2); data/gplcver-2.12a/src/v_prp.c:742:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "%s : %s", s2, __to_uvvnam(s1, (word32) val)); data/gplcver-2.12a/src/v_prp.c:773:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(s, line); data/gplcver-2.12a/src/v_prp.c:1488:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s %s in %s", s2, tskp->tsksyp->synam, data/gplcver-2.12a/src/v_prp.c:1491:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s1, "in module %s", __inst_mod->msym->synam); data/gplcver-2.12a/src/v_prp2.c:575:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "in %s(%s):", __inst_mod->msym->synam, __msg2_blditree(__xs, data/gplcver-2.12a/src/v_prp2.c:578:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s1, "in %s(CONNECT?):", __inst_mod->msym->synam); data/gplcver-2.12a/src/v_prp2.c:580:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s1, "in %s:", __inst_mod->msym->synam); data/gplcver-2.12a/src/v_prp2.c:734:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s gate input %d", gp->gmsym->synam, pi + 1); data/gplcver-2.12a/src/v_prp2.c:735:15: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s1, "udp \"%s\" input %d", gp->gmsym->synam, pi + 1); data/gplcver-2.12a/src/v_prp2.c:7233:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "IDENTIFIER: %s", ndp->lu.sy->synam); data/gplcver-2.12a/src/v_prp2.c:7237:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "XMR: %s", ndp->ru.grp->gnam); data/gplcver-2.12a/src/v_prp2.c:7244:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "NUMBER: %s", __xregab_tostr(s2, ap, bp, ndp->szu.xclen, ndp)); data/gplcver-2.12a/src/v_prp2.c:7250:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "REAL: %s", __regab_tostr(s2, ap, ap, ndp->szu.xclen, BDBLE, data/gplcver-2.12a/src/v_prp2.c:7260:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, __to_opname(ndp->optyp)); return(s); data/gplcver-2.12a/src/v_prp2.c:7263:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, s1); data/gplcver-2.12a/src/v_sdf.c:675:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__sdf_log_fnam, sdflogfn_chp); data/gplcver-2.12a/src/v_sdf.c:1102:28: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (__toktyp == LITSTR) strcpy(__sdf_work_str, __token); data/gplcver-2.12a/src/v_sdf.c:1446:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s2, "%s[%d]", inam, i1); data/gplcver-2.12a/src/v_sdf.c:1447:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(inam, s2); data/gplcver-2.12a/src/v_sdf.c:1594:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(errmsg, "component %s undefined in %s", chp, mdp->msym->synam); data/gplcver-2.12a/src/v_sdf.c:1625:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(errmsg, "select of non-instance array %s", ip->isym->synam); data/gplcver-2.12a/src/v_sdf.c:1641:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(errmsg, "select of instance array %s required", isyp->synam); data/gplcver-2.12a/src/v_sdf.c:1730:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ctgnam, chp); data/gplcver-2.12a/src/v_sdf.c:1765:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ctgnam, dumsyp->synam); data/gplcver-2.12a/src/v_sdf.c:1895:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(formnam, __token); data/gplcver-2.12a/src/v_sdf.c:1996:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "(DEVICE %s %s in %s", ctgp->gmsym->synam, ctgp->gsym->synam, data/gplcver-2.12a/src/v_sdf.c:2067:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s(%s) from '*'", __msg2_blditree(s2, itp2), data/gplcver-2.12a/src/v_sdf.c:2076:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s(%s)", __msg2_blditree(s2, itp), mdp->msym->synam); data/gplcver-2.12a/src/v_sdf.c:2157:19: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (itp == NULL) sprintf(s, "* (all instances of type %s under %s", data/gplcver-2.12a/src/v_sdf.c:2159:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s, "%s (type %s)", itp->itip->isym->synam, ctmdp->msym->synam); data/gplcver-2.12a/src/v_sdf.c:2192:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(formnam, __token); data/gplcver-2.12a/src/v_sdf.c:2235:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(formnam, __token); data/gplcver-2.12a/src/v_sdf.c:2569:22: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (eval == NOEDGE) sprintf(s3, "%s%s", psrcnam, s1); data/gplcver-2.12a/src/v_sdf.c:2570:30: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else if (eval == E_POSEDGE) sprintf(s3, "(posedge %s%s)", psrcnam, s1); data/gplcver-2.12a/src/v_sdf.c:2571:30: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else if (eval == E_NEGEDGE) sprintf(s3, "(negedge %s%s)", psrcnam, s1); data/gplcver-2.12a/src/v_sdf.c:2575:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "(COND ... (IOPATH %s %s%s", s3, pdstnam, s2); data/gplcver-2.12a/src/v_sdf.c:2577:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "(CONDELSE ... (IOPATH %s %s%s", s3, pdstnam, s2); data/gplcver-2.12a/src/v_sdf.c:2578:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s, "(IOPATH %s %s%s", s3, pdstnam, s2); data/gplcver-2.12a/src/v_sdf.c:2600:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "(IOPATH for path at %s", __bld_lineloc(__xs, data/gplcver-2.12a/src/v_sdf.c:2636:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s(%s) from '*'", __msg2_blditree(s2, itp2), data/gplcver-2.12a/src/v_sdf.c:2645:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s(%s)", __msg2_blditree(s2, itp), mdp->msym->synam); data/gplcver-2.12a/src/v_sdf.c:2987:28: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (__toktyp == LITSTR) { strcpy(labnam, __token); get_sdftok(f); } data/gplcver-2.12a/src/v_sdf.c:3213:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sdf_tcnam, prt_sdftok()); data/gplcver-2.12a/src/v_sdf.c:3280:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "(TIMINGCHECK (%s at %s", sdf_tcnam, data/gplcver-2.12a/src/v_sdf.c:3303:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "(TIMINGCHECK (%s at %s second limit", sdf_tcnam, data/gplcver-2.12a/src/v_sdf.c:3381:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s half of (TIMINGCHECK (%s at %s", sdf_tcnam, s2, data/gplcver-2.12a/src/v_sdf.c:3463:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s half of (TIMINGCHECK (%s at %s", sdf_tcnam, s2, data/gplcver-2.12a/src/v_sdf.c:3780:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s(%s) from '*'", __msg2_blditree(s2, itp2), data/gplcver-2.12a/src/v_sdf.c:3789:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s(%s)", __msg2_blditree(s2, itp), mdp->msym->synam); data/gplcver-2.12a/src/v_sdf.c:3880:28: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (__toktyp == LITSTR) { strcpy(labnam, __token); get_sdftok(f); } data/gplcver-2.12a/src/v_sdf.c:4017:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "(TIMINGCHECK (%s [ref.]", sdf_tcnam); data/gplcver-2.12a/src/v_sdf.c:4021:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "(TIMINGCHECK (%s [data]", sdf_tcnam); data/gplcver-2.12a/src/v_sdf.c:4088:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "(TIMINGCHECK (%s [ref.]", sdf_tcnam); data/gplcver-2.12a/src/v_sdf.c:4093:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "(TIMINGCHECK (%s [data]", sdf_tcnam); data/gplcver-2.12a/src/v_sdf.c:4339:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "(PORT %s in %s", port, mdp->msym->synam); data/gplcver-2.12a/src/v_sdf.c:4406:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, mpp->mpsnam); data/gplcver-2.12a/src/v_sdf.c:4408:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s, ".%s(%s)", mpp->mpsnam, __msgexpr_tostr(s1, mpp->mpref)); data/gplcver-2.12a/src/v_sdf.c:4464:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(nam, qualport); data/gplcver-2.12a/src/v_sdf.c:4489:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(nam, tailsyp->synam); data/gplcver-2.12a/src/v_sdf.c:4784:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, data/gplcver-2.12a/src/v_sdf.c:4790:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "(INTERCONNECT destination port %s in %s", dport, data/gplcver-2.12a/src/v_sdf.c:4854:16: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (i1 == -1) strcpy(s, pnam); data/gplcver-2.12a/src/v_sdf.c:4855:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else if (i1 == i2) sprintf(s, "%s[%d]", pnam, i1); data/gplcver-2.12a/src/v_sdf.c:4856:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s, "%s[%d:%d]", pnam, i1, i2); data/gplcver-2.12a/src/v_sdf.c:5179:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(constraint_name, __token); data/gplcver-2.12a/src/v_sdf.c:5557:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s(%s)", __msg2_blditree(s2, itp2), data/gplcver-2.12a/src/v_sdf.c:5578:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "all instances of %s", mdp->msym->synam); data/gplcver-2.12a/src/v_sdf.c:5607:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "instance %s under %s)", __msg2_blditree(s2, itp2), data/gplcver-2.12a/src/v_sdf.c:5700:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(pnam, tailsyp->synam); data/gplcver-2.12a/src/v_sdf.c:6393:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__sdf_work_str, __token); data/gplcver-2.12a/src/v_sdf.c:6930:22: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (ind1 != -1) { sprintf(s1, "%s[%d]", s2, ind1); strcpy(s2, s1); } data/gplcver-2.12a/src/v_sdf.c:6930:55: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (ind1 != -1) { sprintf(s1, "%s[%d]", s2, ind1); strcpy(s2, s1); } data/gplcver-2.12a/src/v_sdf.c:6939:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(verid, s2); data/gplcver-2.12a/src/v_sdf.c:6949:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(verid, s1); data/gplcver-2.12a/src/v_sdf.c:6992:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, sdfid); data/gplcver-2.12a/src/v_sdf.c:6995:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, ++chp); data/gplcver-2.12a/src/v_sdf.c:7002:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(s1, sdfid); data/gplcver-2.12a/src/v_sdf.c:7033:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(verid, s2); data/gplcver-2.12a/src/v_sdf.c:7063:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s2, chp); data/gplcver-2.12a/src/v_sdf.c:7356:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, skeywds[vi].sknam); data/gplcver-2.12a/src/v_sim.c:728:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__dv_fnam, DFLTDVFNAM); data/gplcver-2.12a/src/v_sim.c:2125:27: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (__showe_onevent) sprintf(s2, "%s (on event)", __to_timstr(__xs, data/gplcver-2.12a/src/v_sim.c:2127:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s2, "%s (on detect)", __to_timstr(__xs, &__simtime)); data/gplcver-2.12a/src/v_sim.c:2178:25: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (__showe_onevent) sprintf(s1, "%s (on event)", __to_timstr(__xs, data/gplcver-2.12a/src/v_sim.c:2180:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s1, "%s (on detect)", __to_timstr(s1, &__simtime)); data/gplcver-2.12a/src/v_sim.c:2236:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "%s.%s", __msg_blditree(s2, teitp, tskp), __schop(s1, onam)); data/gplcver-2.12a/src/v_sim.c:2318:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s2, "old %s, scheduled %s, new %s%s", data/gplcver-2.12a/src/v_sim.c:3410:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "continuous assign in %s %s", __msg2_blditree(s1, teitp), data/gplcver-2.12a/src/v_sim.c:3772:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s1, __schop(s2, np->nsym->synam)); data/gplcver-2.12a/src/v_sim.c:3774:34: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (bi1 == -1 || !np->n_isavec) strcpy(s, s1); data/gplcver-2.12a/src/v_sim.c:3775:23: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else if (bi1 == bi2) sprintf(s, "%s[%d]", s1, __unnormalize_ndx(np, bi1)); data/gplcver-2.12a/src/v_sim.c:3776:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s, "%s[%d:%d]", s1, __unnormalize_ndx(np, bi1), data/gplcver-2.12a/src/v_sim.c:3794:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s1, s2); data/gplcver-2.12a/src/v_sim.c:3796:36: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (bi == -1 || mpp->mpwide == 1) strcpy(s, s1); data/gplcver-2.12a/src/v_sim.c:3797:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s, "%s[%d]", s1, bi); data/gplcver-2.12a/src/v_sim.c:4685:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s1, "%s.%s", __msg2_blditree(__xs, __inst_ptr), data/gplcver-2.12a/src/v_sim.c:4726:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s1, "%s.%s", __msg2_blditree(__xs, __inst_ptr), data/gplcver-2.12a/src/v_sim.c:4767:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s1, "%s.%s", __msg2_blditree(__xs, __inst_ptr), data/gplcver-2.12a/src/v_sim.c:4789:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "%s.%s (xmr from %s)", data/gplcver-2.12a/src/v_sim.c:4811:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "EDGE: %s", __to_edgenam(s2, cedge)); data/gplcver-2.12a/src/v_sim.c:4812:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, s1); data/gplcver-2.12a/src/v_sim.c:4818:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "CONDITION: %s TRUE value %s", __msgexpr_tostr(s2, cxp), data/gplcver-2.12a/src/v_sim.c:4823:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s, s1); data/gplcver-2.12a/src/v_sim.c:5110:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, __exprline); data/gplcver-2.12a/src/v_src.c:1050:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__portnam, __token); data/gplcver-2.12a/src/v_src.c:1098:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (idx != NULL) strcpy(__portnam, idx->lu.sy->synam); data/gplcver-2.12a/src/v_src.c:1532:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(typnam, __token); data/gplcver-2.12a/src/v_src.c:2851:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(paramnam, __token); data/gplcver-2.12a/src/v_src.c:3208:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s declaration first range", ptnam); data/gplcver-2.12a/src/v_src.c:3222:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s declaration second range", ptnam); data/gplcver-2.12a/src/v_src.c:3436:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "parameter array cell %s[%d] initializer", np->nsym->synam, data/gplcver-2.12a/src/v_src.c:5418:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, __token); data/gplcver-2.12a/src/v_src.c:5740:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(nam, __token); data/gplcver-2.12a/src/v_src.c:5992:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__portnam, __token); data/gplcver-2.12a/src/v_src.c:6096:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cp, s); data/gplcver-2.12a/src/v_src2.c:1280:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, __expr_idtab[0]->idnam); data/gplcver-2.12a/src/v_src2.c:4222:19: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (glen == 0) strcpy(gnam, chp); data/gplcver-2.12a/src/v_src2.c:4223:29: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else { gnam[glen] = '.'; strcpy(&(gnam[glen + 1]), chp); } data/gplcver-2.12a/src/v_src2.c:4691:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(xidp->idnam, idnam); data/gplcver-2.12a/src/v_src2.c:4943:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "IDENTIFIER: %s", xidp->idnam); data/gplcver-2.12a/src/v_src2.c:4951:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "NUMBER: %s", __regab_tostr(s2, ap, bp, ndp->szu.xclen, data/gplcver-2.12a/src/v_src2.c:4958:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "REAL: %s", __regab_tostr(s2, ap, ap, ndp->szu.xclen, BDBLE, data/gplcver-2.12a/src/v_src2.c:4968:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, __to_opname(ndp->optyp)); return(s); data/gplcver-2.12a/src/v_src2.c:4971:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, s1); data/gplcver-2.12a/src/v_src3.c:836:16: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). case ID: strcat(uline, __token); break; data/gplcver-2.12a/src/v_src3.c:838:20: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). case NUMBER: strcat(uline, __numtoken); break; data/gplcver-2.12a/src/v_src3.c:1339:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, " = 1'b%s", __to_uvvnam(s2, (word32) udpp->ival)); data/gplcver-2.12a/src/v_src3.c:1591:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(paramnam, __token); data/gplcver-2.12a/src/v_src3.c:2335:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "__%s$$%d", pref, num); data/gplcver-2.12a/src/v_src3.c:3021:16: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). case ID: strcat(s1, __token); break; data/gplcver-2.12a/src/v_src3.c:3022:20: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). case NUMBER: strcat(s1, __numtoken); break; data/gplcver-2.12a/src/v_src3.c:3189:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, __langstr); data/gplcver-2.12a/src/v_src3.c:3192:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(__langstr, s1); data/gplcver-2.12a/src/v_src3.c:3203:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__macwrkstr, chp2); data/gplcver-2.12a/src/v_src3.c:3408:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__attrparsestr, attlin); data/gplcver-2.12a/src/v_src3.c:3462:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(attnam, __token); data/gplcver-2.12a/src/v_src3.c:3921:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cfgnam, __token); data/gplcver-2.12a/src/v_src3.c:3937:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, &(cfgnam[1])); data/gplcver-2.12a/src/v_src3.c:3940:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cfgnam, s1); data/gplcver-2.12a/src/v_src3.c:4075:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(objnam, __token); data/gplcver-2.12a/src/v_src3.c:4289:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(libnam, s1); data/gplcver-2.12a/src/v_src3.c:4292:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s2, chp); data/gplcver-2.12a/src/v_src3.c:4298:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, &(s2[1])); data/gplcver-2.12a/src/v_src3.c:4307:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(celnam, s1); data/gplcver-2.12a/src/v_src3.c:4310:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(celnam, s2); data/gplcver-2.12a/src/v_src3.c:4380:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s2, &(s1[1])); data/gplcver-2.12a/src/v_src3.c:4388:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s2, chp); data/gplcver-2.12a/src/v_src3.c:4443:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s2, nam); data/gplcver-2.12a/src/v_src3.c:4453:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(celnam, s1); data/gplcver-2.12a/src/v_src3.c:4464:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(libnam, s1); data/gplcver-2.12a/src/v_src3.c:4466:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, chp); data/gplcver-2.12a/src/v_src3.c:4468:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(s1, nam); data/gplcver-2.12a/src/v_src3.c:4475:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(celnam, s1); data/gplcver-2.12a/src/v_src3.c:4541:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s2, use_spec); data/gplcver-2.12a/src/v_src3.c:4551:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(celnam, s1); data/gplcver-2.12a/src/v_src3.c:4573:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(libnam, s1); data/gplcver-2.12a/src/v_src3.c:4575:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, chp); data/gplcver-2.12a/src/v_src3.c:4577:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(s1, use_spec); data/gplcver-2.12a/src/v_src3.c:4586:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(celnam, s1); data/gplcver-2.12a/src/v_src3.c:4595:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(celnam, s2); data/gplcver-2.12a/src/v_src3.c:4880:32: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if ((cp - last) == 0) strcpy(str, cp); data/gplcver-2.12a/src/v_src3.c:4897:52: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (xfp->xpfnxt != NULL) return(FALSE); strcpy(str, last); data/gplcver-2.12a/src/v_src3.c:4969:24: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (path == NULL) sprintf(dirstr, "./%s", dir->d_name); data/gplcver-2.12a/src/v_src3.c:4970:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(dirstr, "%s/%s", path, dir->d_name); data/gplcver-2.12a/src/v_src3.c:4981:24: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (path == NULL) strcpy(str, dir->d_name); data/gplcver-2.12a/src/v_src3.c:4982:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(str, "%s/%s", cp, dir->d_name); data/gplcver-2.12a/src/v_src3.c:4988:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(str2, "%s/%s", bpath, str); data/gplcver-2.12a/src/v_src3.c:5040:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bpath, xfp_hd->fpat); data/gplcver-2.12a/src/v_src3.c:5045:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmp, bpath); data/gplcver-2.12a/src/v_src3.c:5046:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(bpath, "%s/%s", tmp, xfp_hd->fpat); data/gplcver-2.12a/src/v_src3.c:5250:20: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (level == 0) strcpy(bpath, xfp_hd->fpat); data/gplcver-2.12a/src/v_src3.c:5251:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(bpath, "%s/%s", bpath, xfp_hd->fpat); data/gplcver-2.12a/src/v_src3.c:5315:28: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (path == NULL) sprintf(dirstr, "%s", dir->d_name); data/gplcver-2.12a/src/v_src3.c:5316:15: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(dirstr, "%s/%s", path, dir->d_name); data/gplcver-2.12a/src/v_src3.c:5348:26: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (path == NULL) sprintf(str, "%s", dir->d_name); data/gplcver-2.12a/src/v_src3.c:5349:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(str, "%s/%s", cp, dir->d_name); data/gplcver-2.12a/src/v_src3.c:5352:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(str2, "%s/%s", bpath, str); data/gplcver-2.12a/src/v_src3.c:5534:24: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (path == NULL) sprintf(dirstr, "./%s", dir->d_name); data/gplcver-2.12a/src/v_src3.c:5535:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(dirstr, "%s/%s", path, dir->d_name); data/gplcver-2.12a/src/v_src3.c:5545:24: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (path == NULL) sprintf(str, "%s", dir->d_name); data/gplcver-2.12a/src/v_src3.c:5546:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(str, "%s/%s", cp, dir->d_name); data/gplcver-2.12a/src/v_src3.c:5839:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "**%s(%d)", __schop(s1, fnam), fnlcnt); data/gplcver-2.12a/src/v_src3.c:6077:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, rulp->objnam); data/gplcver-2.12a/src/v_src3.c:6102:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, rulp->objnam); data/gplcver-2.12a/src/v_src3.c:6479:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, tnp->ndp->synam); data/gplcver-2.12a/src/v_src3.c:6489:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ntnp->ndp->synam, s1); data/gplcver-2.12a/src/v_tf.c:1219:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(pinfo->node_symbol, np->nsym->synam); data/gplcver-2.12a/src/v_tf.c:1507:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chp, &(__exprline[sav_sofs])); data/gplcver-2.12a/src/v_tf.c:3614:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chp, s1); data/gplcver-2.12a/src/v_tf.c:3669:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chp, s1); data/gplcver-2.12a/src/v_tf.c:3893:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chp, &(__exprline[sav_sofs])); data/gplcver-2.12a/src/v_tf.c:3934:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chp, &(__exprline[sav_sofs])); data/gplcver-2.12a/src/v_tf.c:4262:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, " now %s", __to_timstr(s2, &__simtime)); data/gplcver-2.12a/src/v_tf.c:4297:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, " now %s", __to_timstr(s2, &__simtime)); data/gplcver-2.12a/src/v_tf.c:4337:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, " now %s", __to_timstr(s2, &__simtime)); data/gplcver-2.12a/src/v_tf.c:4392:4: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(__fio_fdtab[fd]->fd_s, format, va); data/gplcver-2.12a/src/v_tf.c:4403:4: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(format, va); data/gplcver-2.12a/src/v_tf.c:4404:25: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if (__log_s != NULL) vfprintf(__log_s, format, va2); data/gplcver-2.12a/src/v_tf.c:4425:8: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(__mulchan_tab[i].mc_s, format, va); data/gplcver-2.12a/src/v_tf.c:4446:2: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(format, va); data/gplcver-2.12a/src/v_tf.c:4447:23: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if (__log_s != NULL) vfprintf(__log_s, format, va2); data/gplcver-2.12a/src/v_tf.c:4743:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chp, chp2); data/gplcver-2.12a/src/v_trch.c:434:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s2, "%s.%s[%d]", __msg2_blditree(__xs, itp), np->nsym->synam, data/gplcver-2.12a/src/v_trch.c:437:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s2, "%s.%s", __msg2_blditree(__xs, itp), np->nsym->synam); data/gplcver-2.12a/src/v_trch.c:667:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__xs2, ", itp=%s", __msg2_blditree(__xs, __inst_ptr)); data/gplcver-2.12a/src/v_trch.c:2476:27: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (__showe_onevent) sprintf(s1, "%s (on event)", __to_timstr(__xs, data/gplcver-2.12a/src/v_trch.c:2478:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s1, "%s (on detect)", __to_timstr(__xs, &__simtime)); data/gplcver-2.12a/src/v_trch.c:2525:25: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (__showe_onevent) sprintf(s2, "%s (on event)", __to_timstr(__xs, data/gplcver-2.12a/src/v_trch.c:2527:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s2, "%s (on detect)", __to_timstr(__xs, &__simtime)); data/gplcver-2.12a/src/v_trch.c:2735:20: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (np->n_isavec) sprintf(s1, "%s[%d]", np->nsym->synam, bi); data/gplcver-2.12a/src/v_trch.c:2736:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(s1, np->nsym->synam); data/gplcver-2.12a/src/v_trch.c:2762:20: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (np->n_isavec) sprintf(s3, "%s[%d]", np->nsym->synam, bi); data/gplcver-2.12a/src/v_trch.c:2763:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(s3, np->nsym->synam); data/gplcver-2.12a/src/v_trch.c:3414:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, data/gplcver-2.12a/src/v_trch.c:3735:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s.", __msg2_blditree(__xs, __inst_ptr)); data/gplcver-2.12a/src/v_trch.c:3803:29: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (bidvtxlp->vi1 == -1) strcpy(s1, bidvtxlp->vnp->nsym->synam); data/gplcver-2.12a/src/v_trch.c:3804:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s1, "%s[%d]", bidvtxlp->vnp->nsym->synam, bidvtxlp->vi1); data/gplcver-2.12a/src/v_trch.c:3906:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (vp->vi1 == -1) strcpy(s, vp->vnp->nsym->synam); data/gplcver-2.12a/src/v_trch.c:3907:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s, "%s[%d]", vp->vnp->nsym->synam, vp->vi1); data/gplcver-2.12a/src/v_trch.c:4400:22: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (np->n_isavec) sprintf(s1, "%s[%d]", np->nsym->synam, biti); data/gplcver-2.12a/src/v_trch.c:4401:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(s1, np->nsym->synam); data/gplcver-2.12a/src/v_trch.c:4499:22: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (np->n_isavec) sprintf(s1, "%s[%d]", np->nsym->synam, biti); data/gplcver-2.12a/src/v_trch.c:4500:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(s1, np->nsym->synam); data/gplcver-2.12a/src/v_trch.c:4582:19: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (ndx == -1) strcpy(__wrks1, np->nsym->synam); data/gplcver-2.12a/src/v_trch.c:4583:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(__wrks1, "%s[%d]", np->nsym->synam, data/gplcver-2.12a/src/v_trch.c:4657:19: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (ndx == -1) strcpy(__wrks2, np->nsym->synam); data/gplcver-2.12a/src/v_trch.c:4658:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(__wrks2, "%s[%d]", np->nsym->synam, data/gplcver-2.12a/src/v_trch.c:4668:19: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (ndx == -1) strcpy(__wrks2, np->nsym->synam); data/gplcver-2.12a/src/v_trch.c:4669:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(__wrks2, "%s[%d]", np->nsym->synam, data/gplcver-2.12a/src/v_vpi.c:308:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, ldp->libnam); data/gplcver-2.12a/src/v_vpi.c:309:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s1, SO_SUFFIX); data/gplcver-2.12a/src/v_vpi.c:346:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s1, dnbp->bootrout_nam); data/gplcver-2.12a/src/v_vpi.c:348:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, dnbp->bootrout_nam); data/gplcver-2.12a/src/v_vpi2.c:2522:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s[%d]", np->nsym->synam, __unnormalize_ndx(np, bi)); data/gplcver-2.12a/src/v_vpi2.c:2589:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s[%d]", np->nsym->synam, __unnormalize_ndx(np, bi)); data/gplcver-2.12a/src/v_vpi2.c:6553:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, __in_fils[gp->gsym->syfnam_ind]); data/gplcver-2.12a/src/v_vpi2.c:6565:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, __in_fils[syp->syfnam_ind]); data/gplcver-2.12a/src/v_vpi2.c:6585:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, __in_fils[stp->stfnam_ind]); data/gplcver-2.12a/src/v_vpi2.c:6597:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, __in_fils[hrp->hu.hdfp->dfpfnam_ind]); data/gplcver-2.12a/src/v_vpi2.c:6603:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, __in_fils[hrp->hu.hnp->nsym->syfnam_ind]); data/gplcver-2.12a/src/v_vpi2.c:6612:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, __in_fils[hrp->hu.hudpp->usym->syfnam_ind]); data/gplcver-2.12a/src/v_vpi2.c:6616:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, hrp->hu.hudpp->usym->synam); data/gplcver-2.12a/src/v_vpi2.c:6623:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, __in_fils[hrp->hu.hutlp->utlfnam_ind]); data/gplcver-2.12a/src/v_vpi2.c:6642:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). case vpiName: strcpy(__wrk_vpiget_str, ip->isym->synam); break; data/gplcver-2.12a/src/v_vpi2.c:6644:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, __msg2_blditree(__wrks1, hp->hin_itp)); data/gplcver-2.12a/src/v_vpi2.c:6647:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, __in_fils[ip->isym->syfnam_ind]); data/gplcver-2.12a/src/v_vpi2.c:6650:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, mdp->msym->synam); data/gplcver-2.12a/src/v_vpi2.c:6653:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, __in_fils[mdp->msym->syfnam_ind]); data/gplcver-2.12a/src/v_vpi2.c:6696:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, __in_fils[np->nsym->syfnam_ind]); data/gplcver-2.12a/src/v_vpi2.c:6698:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). case vpiName: strcpy(__wrk_vpiget_str, np->nsym->synam); break; data/gplcver-2.12a/src/v_vpi2.c:6701:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__wrk_vpiget_str, "%s.%s", __msg2_blditree(__wrks1, hp->hin_itp), data/gplcver-2.12a/src/v_vpi2.c:6703:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(__wrk_vpiget_str, "%s.%s", data/gplcver-2.12a/src/v_vpi2.c:6726:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, __in_fils[mpp->mpfnam_ind]); data/gplcver-2.12a/src/v_vpi2.c:6747:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, gp->gmsym->synam); data/gplcver-2.12a/src/v_vpi2.c:6750:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, __in_fils[gp->gsym->syfnam_ind]); data/gplcver-2.12a/src/v_vpi2.c:6752:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). case vpiName: strcpy(__wrk_vpiget_str, gp->gsym->synam); break; data/gplcver-2.12a/src/v_vpi2.c:6754:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__wrk_vpiget_str, "%s.%s", __msg2_blditree(__wrks1, data/gplcver-2.12a/src/v_vpi2.c:6773:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, __in_fils[stp->stfnam_ind]); data/gplcver-2.12a/src/v_vpi2.c:6776:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, stp->st.stkc.tsksyx->lu.sy->synam); data/gplcver-2.12a/src/v_vpi2.c:6801:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, hrp->hu.hxp->lu.x->lu.sy->synam); data/gplcver-2.12a/src/v_vpi2.c:6821:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, tskp->tsksyp->synam); data/gplcver-2.12a/src/v_vpi2.c:6824:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__wrk_vpiget_str, "%s.%s", __msg2_blditree(__wrks1, hp->hin_itp), data/gplcver-2.12a/src/v_vpi2.c:6828:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, __in_fils[tskp->tsksyp->syfnam_ind]); data/gplcver-2.12a/src/v_vpi2.c:6851:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, hrp->hu.hmpp->mpsnam); data/gplcver-2.12a/src/v_vpi2.c:6853:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(__wrk_vpiget_str, hrp->hu.hnp->nsym->synam); data/gplcver-2.12a/src/v_vpi2.c:6857:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, __in_fils[hrp->hu.hmpp->mpfnam_ind]); data/gplcver-2.12a/src/v_vpi2.c:6858:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(__wrk_vpiget_str, __in_fils[hrp->hu.hnp->nsym->syfnam_ind]); data/gplcver-2.12a/src/v_vpi2.c:6877:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(__wrk_vpiget_str, attrp->attrnam); data/gplcver-2.12a/src/v_vpi3.c:1872:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, tfdatp->tfname); data/gplcver-2.12a/src/v_vpi3.c:2563:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(value_p->value.str, &(__exprline[sav_sofs])); data/gplcver-2.12a/src/v_vpi3.c:2612:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(value_p->value.str, chp); data/gplcver-2.12a/src/v_vpi3.c:2694:8: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s, s1); data/gplcver-2.12a/src/v_vpi3.c:2698:37: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). else { sprintf(s1, "%5c", *chp); strcat(s, s1); } data/gplcver-2.12a/src/v_vpi3.c:2701:34: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). { sprintf(s1, " : %c ", *chp); strcat(s, s1); chp++; } data/gplcver-2.12a/src/v_vpi3.c:2703:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s, s1); data/gplcver-2.12a/src/v_vpi3.c:3440:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, np->nsym->synam); data/gplcver-2.12a/src/v_vpi3.c:3578:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, np->nsym->synam); data/gplcver-2.12a/src/v_vpi3.c:4371:19: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (ndx == -1) strcpy(__wrks1, np->nsym->synam); data/gplcver-2.12a/src/v_vpi3.c:4372:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(__wrks1, "%s[%d]", np->nsym->synam, data/gplcver-2.12a/src/v_vpi3.c:4486:19: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (ndx == -1) strcpy(__wrks2, np->nsym->synam); data/gplcver-2.12a/src/v_vpi3.c:4487:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(__wrks2, "%s[%d]", np->nsym->synam, __unnormalize_ndx(np, ndx)); data/gplcver-2.12a/src/v_vpi3.c:4496:19: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (ndx == -1) strcpy(__wrks2, np->nsym->synam); data/gplcver-2.12a/src/v_vpi3.c:4497:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(__wrks2, "%s[%d]", np->nsym->synam, __unnormalize_ndx(np, ndx)); data/gplcver-2.12a/src/v_vpi3.c:4562:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, tfdatp->tfname); data/gplcver-2.12a/src/v_vpi3.c:4851:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(ts3, "array word32 %s[%d]", np->nsym->synam, data/gplcver-2.12a/src/v_vpi3.c:4857:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(ts3, "%s %s[%d]", __to_wtnam(ts1, np), np->nsym->synam, data/gplcver-2.12a/src/v_vpi3.c:4863:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(ts3, "%s %s", __to_wtnam(ts1, np), np->nsym->synam); data/gplcver-2.12a/src/v_vpi3.c:5805:21: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. numch_prtfed = vfprintf(__fio_fdtab[fd]->fd_s, format, va); data/gplcver-2.12a/src/v_vpi3.c:5817:19: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. numch_prtfed = vprintf(format, va); data/gplcver-2.12a/src/v_vpi3.c:5818:25: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if (__log_s != NULL) vfprintf(__log_s, format, va2); data/gplcver-2.12a/src/v_vpi3.c:5840:23: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. numch_prtfed = vfprintf(__mulchan_tab[i].mc_s, format, va); data/gplcver-2.12a/src/v_vpi3.c:5867:15: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. num_prtfed = vprintf(format, va); data/gplcver-2.12a/src/v_vpi3.c:5868:23: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if (__log_s != NULL) vfprintf(__log_s, format, va2); data/gplcver-2.12a/src/v_vpi3.c:5888:15: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. num_prtfed = vsnprintf(buf, RDBUFSIZ, format, ap); data/gplcver-2.12a/src/v_vpi3.c:5921:21: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. numch_prtfed = vfprintf(__fio_fdtab[fd]->fd_s, format, ap); data/gplcver-2.12a/src/v_vpi3.c:5927:17: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. numch_prtfed = vsnprintf(buf, RDBUFSIZ, format, ap); data/gplcver-2.12a/src/v_vpi3.c:6502:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s2, "vpi_control %s operation", s1); data/gplcver-2.12a/src/v_vpi3.c:6633:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "%s%s of %s (%s).\n", __vers, __vers2, __ofdt, __platform); data/gplcver-2.12a/src/v_vpi3.c:6743:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s2, s1); data/gplcver-2.12a/src/v_vpi3.c:6760:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s2, s1); data/gplcver-2.12a/src/v_vpi3.c:7000:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, onames_vpi[vpioval].vpiobjnam); data/gplcver-2.12a/src/v_vpi3.c:7005:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, cv_onames_vpi[vpioval - CV_START_ONUMS].vpiobjnam); data/gplcver-2.12a/src/v_vpi3.c:7127:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, pnames_vpi[pval].vpipropnam); data/gplcver-2.12a/src/v_vpi3.c:7189:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, opnames_vpi[opval].vpiopnam); data/gplcver-2.12a/src/v_vpi3.c:7202:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, opnames_vpi[opval].vpiopchar); data/gplcver-2.12a/src/v_vpi3.c:7361:2: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(__wrk_vpiemsg, s, va); data/gplcver-2.12a/src/v_vpi3.c:7387:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__wrk_vpi_product, "%s%s", __vers, __vers2); data/gplcver-2.12a/src/v_vpi3.c:7424:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(__wrk_vpi_product, "%s%s", __vers, __vers2); data/gplcver-2.12a/tests_and_examples/examples.acc/acc_probe.c:135:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, acc_fetch_name(argh)); data/gplcver-2.12a/tests_and_examples/examples.acc/acc_probe.c:169:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(value_ar[nparam][last_entry], acc_fetch_value(argh, "%d", NULL)); data/gplcver-2.12a/tests_and_examples/examples.acc/acc_prtchg.c:151:26: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (typ != accTerminal) strcpy(s1, acc_fetch_fullname(net)); data/gplcver-2.12a/tests_and_examples/examples.acc/acc_prtchg.c:194:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s2, acc_fetch_value(net, "%v", NULL)); data/gplcver-2.12a/tests_and_examples/examples.acc/acc_prtchg.c:207:26: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (typ != accTerminal) strcpy(s3, acc_fetch_fullname(net)); data/gplcver-2.12a/tests_and_examples/examples.acc/acc_prtchg.c:245:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "obj=%s", acc_fetch_type_str(otyp)); data/gplcver-2.12a/tests_and_examples/examples.acc/acc_prtchg.c:247:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(s1, acc_fetch_value(net, "%b", NULL)); data/gplcver-2.12a/tests_and_examples/examples.acc/acc_prtchg.c:252:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s2, "scalar=%u(%s)", (unsigned) vcp->out_value.logic_value, s1); data/gplcver-2.12a/tests_and_examples/examples.acc/acc_prtchg.c:255:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s2, "sr-scalar=%u(%s)", (unsigned) vcp->out_value.logic_value, s1); data/gplcver-2.12a/tests_and_examples/examples.acc/acc_prtchg.c:264:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s2, "vector=%s", s1); data/gplcver-2.12a/tests_and_examples/examples.acc/acc_prtchg.c:271:27: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (otyp != accTerminal) strcpy(s3, acc_fetch_fullname(net)); data/gplcver-2.12a/tests_and_examples/examples.acc/accxl_drvld.c:88:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s2, "prim %s port %d", acc_fetch_fullname(acc_handle_parent(term)), data/gplcver-2.12a/tests_and_examples/examples.acc/accxl_drvld.c:91:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(s2, acc_fetch_fullname(term)); data/gplcver-2.12a/tests_and_examples/examples.acc/accxl_drvld.c:132:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s2, "prim %s port %d", acc_fetch_fullname(acc_handle_parent(term)), data/gplcver-2.12a/tests_and_examples/examples.acc/accxl_drvld.c:135:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(s2, acc_fetch_fullname(term)); data/gplcver-2.12a/tests_and_examples/examples.acc/accxl_drvld.c:161:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s2, "prim %s port %d", acc_fetch_fullname(acc_handle_parent(term)), data/gplcver-2.12a/tests_and_examples/examples.acc/accxl_drvld.c:164:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(s2, acc_fetch_fullname(term)); data/gplcver-2.12a/tests_and_examples/examples.tf/plimfil.c:98:6: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. if (fscanf(memval_s, "%s", memval) != 1) data/gplcver-2.12a/tests_and_examples/examples.tf/probe.c:85:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(value_ar[nparam][last_entry], tf_istrgetp(nparam, 'h', setup_inst_p)); data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:290:24: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (cbp->obj != NULL) strcpy(s1, vpi_get_str(vpiFullName, cbp->obj)); data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:419:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tfdat.tfname, s1); data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:426:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tfdat2.tfname, s1); data/gplcver-2.12a/tests_and_examples/examples.vpi/vchkprt1.c:104:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, vpi_get_str(vpiFullName, ihref)); data/gplcver-2.12a/tests_and_examples/examples.vpi/vchkprt1.c:162:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(nnam, vpi_get_str(vpiName, icref)); data/gplcver-2.12a/tests_and_examples/examples.vpi/vchkprt1.c:178:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, vpi_get_str(vpiFullName, ihref)); data/gplcver-2.12a/tests_and_examples/examples.vpi/vchkprt1.c:200:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(nnam, vpi_get_str(vpiName, varef)); data/gplcver-2.12a/tests_and_examples/examples.vpi/vchkprt1.c:323:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, vpi_get_str(vpiFullName, varef)); data/gplcver-2.12a/tests_and_examples/examples.vpi/vchkprt1.c:326:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, s); data/gplcver-2.12a/tests_and_examples/examples.vpi/vchkprt1.c:331:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "%s[%d]", s1, i1); data/gplcver-2.12a/tests_and_examples/examples.vpi/vconta1.c:118:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(nam, vpi_get_str(vpiName, varef)); data/gplcver-2.12a/tests_and_examples/examples.vpi/vconta1.c:125:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(nam, vpi_get_str(vpiName, varef)); data/gplcver-2.12a/tests_and_examples/examples.vpi/vdrvld1.c:176:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s1, "**%s(%d)", chp, vpi_get(vpiLineNo, href)); data/gplcver-2.12a/tests_and_examples/examples.vpi/vdrvld1.c:189:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "**%s(%d)", vpi_get_str(vpiFile, portihref), data/gplcver-2.12a/tests_and_examples/examples.vpi/vdrvld2.c:189:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(s1, "**%s(%d)", chp, vpi_get(vpiLineNo, href)); data/gplcver-2.12a/tests_and_examples/examples.vpi/vdrvld2.c:202:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s1, "**%s(%d)", vpi_get_str(vpiFile, portihref), data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg2.c:186:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, valp->value.str); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg2.c:210:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s, s1); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:180:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, vpi_get_str(vpiFullName, cbp->obj)); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:220:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(varp->fullpthnam, s); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:238:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, valp->value.str); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:262:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s, s1); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdel2.c:108:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s2, vpi_get_str(vpiDefName, href)); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdels.c:113:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s2, vpi_get_str(vpiDefName, href)); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetdels.c:116:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s2, vpi_get_str(vpiDefName, href)); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval1.c:187:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(instnam_tab[last_evh], chp); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval1.c:212:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(wrkval.value.str, valp->value.str); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval2.c:112:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(putv_type, tmpval.value.str); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval2.c:220:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, vpi_get_str(vpiType, drvref)); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval2.c:233:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, vpi_get_str(vpiType, drvref)); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval2.c:248:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, vpi_get_str(vpiType, wref)); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval2.c:270:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(instnam_tab[last_evh], chp); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval2.c:295:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(wrkval.value.str, valp->value.str); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:175:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(token, tmp); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:247:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(newsig->ident, ident); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:260:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(newsig->signame, signame); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:346:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ident, token); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:350:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (signame, curmodG); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:351:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (signame, token); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:358:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (signame, token); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:462:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(scopesG[level], tok); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:464:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(curmodG, scopesG[0]); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:465:10: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(curmodG, sep); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:471:15: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(curmodG, scopesG[i]); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:472:15: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(curmodG, sep); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:922:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(value, line); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:1111:14: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(sig1->vector, svalue1); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:1145:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sig1->vector, svalue1); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:1415:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s1, ctime(&now)); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:1505:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(file_nam1, argv[argc-2]); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:1509:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(file_nam2, argv[argc-1]); data/gplcver-2.12a/src/cver.c:1745:22: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((chp = (char *) getenv ("HOME")) == NULL) strcpy(__pv_homedir, "."); data/gplcver-2.12a/src/v_dbg.c:1512:25: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((usersh = (char *) getenv ("SHELL")) == NULL) usersh = "/bin/sh"; data/gplcver-2.12a/src/cver.c:103:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __pv_homedir[RECLEN]; /* home dir - . if HOME env. not set */ data/gplcver-2.12a/src/cver.c:267:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __lasttoken[IDLEN];/* current last pushed back symbol name */ data/gplcver-2.12a/src/cver.c:268:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __token[IDLEN]; /* current symbol (in canonical (lc) form) */ data/gplcver-2.12a/src/cver.c:313:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __portnam[IDLEN]; data/gplcver-2.12a/src/cver.c:314:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __pv_varnam[IDLEN]; /* variable name */ data/gplcver-2.12a/src/cver.c:395:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __timstr_unitsuf[4];/* to_timstr units suffix if needed */ data/gplcver-2.12a/src/cver.c:425:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __wrk_vpiemsg[IDLEN];/* error msg. work string */ data/gplcver-2.12a/src/cver.c:426:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __wrk_vpiget_str[IDLEN];/* standard required vpi get str string */ data/gplcver-2.12a/src/cver.c:427:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __wrk_vpi_product[256];/* product version */ data/gplcver-2.12a/src/cver.c:428:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __wrk_vpi_errcode[256];/* error codes are Cver err num as str */ data/gplcver-2.12a/src/cver.c:1003:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/cver.c:1536:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/cver.c:2531:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/cver.c:2588:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[2*RECLEN]; data/gplcver-2.12a/src/cver.c:2706:38: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (strcmp(chp, "STDOUT") == 0) strcpy(chp, "stdout"); data/gplcver-2.12a/src/cver.c:2909:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (strcmp(chp3, "") == 0) strcpy(__xs, "[none]"); data/gplcver-2.12a/src/cver.c:2931:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (strcmp(chp3, "") == 0) strcpy(__xs, "[none]"); data/gplcver-2.12a/src/cver.c:3279:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__in_fils[0], "*none*"); data/gplcver-2.12a/src/cver.c:3342:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fnam[IDLEN], pthnam[IDLEN]; data/gplcver-2.12a/src/cver.c:3409:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char optnam[IDLEN], optval[IDLEN], s1[3*IDLEN]; data/gplcver-2.12a/src/cver.c:3492:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[IDLEN], s2[IDLEN]; data/gplcver-2.12a/src/cver.c:3555:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lbnam[IDLEN], rnams[IDLEN], onam[RECLEN]; data/gplcver-2.12a/src/cver.c:3558:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (is_pli1) strcpy(onam, "+loadpli1="); else strcpy(onam, "+loadvpi="); data/gplcver-2.12a/src/cver.c:3558:48: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (is_pli1) strcpy(onam, "+loadpli1="); else strcpy(onam, "+loadvpi="); data/gplcver-2.12a/src/cver.c:3645:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/cver.c:3714:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[IDLEN], s2[IDLEN]; data/gplcver-2.12a/src/cver.c:3840:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[IDLEN]; data/gplcver-2.12a/src/cver.c:4510:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/cver.c:4888:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/cver.c:4951:6: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(s, "(C)"); data/gplcver-2.12a/src/cver.c:4953:40: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else { strcpy(s, mdp->msym->synam); strcat(s, "(C)"); } data/gplcver-2.12a/src/cver.c:5030:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN], s4[RECLEN], s5[RECLEN]; data/gplcver-2.12a/src/cver.c:5054:40: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (prts == 0) strcpy(s1, ""); else sprintf(s1, "%d(%d)", prts, prtbits); data/gplcver-2.12a/src/cver.c:5056:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s2, "%d(%d)", wires, wirebits); data/gplcver-2.12a/src/cver.c:5057:40: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (regs == 0) strcpy(s3, ""); else sprintf(s3, "%d(%d)", regs, regbits); data/gplcver-2.12a/src/cver.c:5059:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s4, "%d(%d, %d)", arrs, arrcells, arrbits); data/gplcver-2.12a/src/cver.c:5066:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s1, "%d(%d)", tot_prts, tot_prtbits); data/gplcver-2.12a/src/cver.c:5068:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s2, "%d(%d)", tot_wires, tot_wirebits); data/gplcver-2.12a/src/cver.c:5070:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s3, "%d(%d)", tot_regs, tot_regbits); data/gplcver-2.12a/src/cver.c:5072:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s4, "%d(%d, %d)", tot_arrs, tot_arrcells, tot_arrbits); data/gplcver-2.12a/src/cver.c:5147:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN], s4[RECLEN], s5[RECLEN]; data/gplcver-2.12a/src/cver.c:5183:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "%d(%d)", st_prts, st_prtbits); data/gplcver-2.12a/src/cver.c:5184:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s2, "%.1f(%.1f)", 100.0*((double) st_prts/prts), data/gplcver-2.12a/src/cver.c:5190:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s3, "%d(%d)", st_wires, st_wirebits); data/gplcver-2.12a/src/cver.c:5191:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s4, "%.1f(%.1f)", 100.0*((double) st_wires/wires), data/gplcver-2.12a/src/cver.c:5203:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "%d(%d)", st_tot_prts, st_tot_prtbits); data/gplcver-2.12a/src/cver.c:5204:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s2, "%.1f(%.1f)", 100.0*((double) st_tot_prts/tot_prts), data/gplcver-2.12a/src/cver.c:5210:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s3, "%d(%d)", st_tot_wires, st_tot_wirebits); data/gplcver-2.12a/src/cver.c:5211:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s4, "%.1f(%.1f)", 100.0*((double) st_tot_wires/tot_wires), data/gplcver-2.12a/src/cver.c:5293:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/cver.c:5372:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], filref[RECLEN]; data/gplcver-2.12a/src/cver.c:5427:29: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (imdp->minstnum == 0) strcpy(s2, "top"); data/gplcver-2.12a/src/cver.c:5428:29: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (imdp->m_iscell) strcpy(s2, "cell"); data/gplcver-2.12a/src/cver.c:5429:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s2, "module"); data/gplcver-2.12a/src/cver.c:5507:26: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (imdp->m_iscell) strcpy(s2, "cell"); else strcpy(s2, "module"); data/gplcver-2.12a/src/cver.c:5507:51: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (imdp->m_iscell) strcpy(s2, "cell"); else strcpy(s2, "module"); data/gplcver-2.12a/src/cver.c:5564:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/cver.c:5566:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (!mdp->m_iscell) strcpy(s1, "Module"); else strcpy(s1, "Cell"); data/gplcver-2.12a/src/cver.c:5566:49: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (!mdp->m_iscell) strcpy(s1, "Module"); else strcpy(s1, "Cell"); data/gplcver-2.12a/src/cver.c:5567:26: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (mdp->minstnum == 0) strcpy(s2, "(top)"); data/gplcver-2.12a/src/cver.c:5568:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s2, "(Instantiated %d Times)", mdp->flatinum); data/gplcver-2.12a/src/v.h:2966:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char __pv_homedir[RECLEN]; /* home dir - . if HOME env. not set */ data/gplcver-2.12a/src/v.h:3130:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char __lasttoken[IDLEN];/* current last pushed back symbol name */ data/gplcver-2.12a/src/v.h:3131:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char __token[IDLEN]; /* current symbol (in canonical (lc) form) */ data/gplcver-2.12a/src/v.h:3176:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char __portnam[IDLEN]; data/gplcver-2.12a/src/v.h:3177:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char __pv_varnam[IDLEN]; /* variable name */ data/gplcver-2.12a/src/v.h:3256:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char __timstr_unitsuf[4];/* to_timstr units suffix if needed */ data/gplcver-2.12a/src/v.h:3286:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char __wrk_vpiemsg[IDLEN];/* error msg. work string */ data/gplcver-2.12a/src/v.h:3287:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char __wrk_vpiget_str[IDLEN];/* standard required vpi get str string */ data/gplcver-2.12a/src/v.h:3288:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char __wrk_vpi_product[256];/* product version */ data/gplcver-2.12a/src/v.h:3289:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char __wrk_vpi_errcode[256];/* error codes are Cver err num as str */ data/gplcver-2.12a/src/v_acc.c:861:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *chp, sname[2*IDLEN]; data/gplcver-2.12a/src/v_acc.c:1404:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *chp, s1[3*RECLEN], s2[6*RECLEN], s3[6*RECLEN]; data/gplcver-2.12a/src/v_acc.c:1554:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *chp, s1[3*RECLEN]; data/gplcver-2.12a/src/v_acc.c:2460:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_acc.c:2577:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case accBinStrVal: strcpy(s, "accBinStrVal"); break; data/gplcver-2.12a/src/v_acc.c:2578:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case accOctStrVal: strcpy(s, "accOctStrVal"); break; data/gplcver-2.12a/src/v_acc.c:2579:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case accDecStrVal: strcpy(s, "accDecStrVal"); break; data/gplcver-2.12a/src/v_acc.c:2580:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case accHexStrVal: strcpy(s, "accHexStrVal"); break; data/gplcver-2.12a/src/v_acc.c:2581:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case accScalarVal: strcpy(s, "accScalarVal"); break; data/gplcver-2.12a/src/v_acc.c:2582:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case accIntVal: strcpy(s, "accIntVal"); break; data/gplcver-2.12a/src/v_acc.c:2583:20: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case accRealVal: strcpy(s, "accRealVal"); break; data/gplcver-2.12a/src/v_acc.c:2584:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case accStringVal: strcpy(s, "accStringVal"); break; data/gplcver-2.12a/src/v_acc.c:2585:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case accVectorVal: strcpy(s, "accVectorVal"); break; data/gplcver-2.12a/src/v_acc.c:3008:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_acc.c:3039:23: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (scoph == NULL) strcpy(s1, "**NONE**"); data/gplcver-2.12a/src/v_acc.c:3434:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argchp, s1[RECLEN]; data/gplcver-2.12a/src/v_acc.c:3581:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_acc.c:3651:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->scanhtab, __aithtab, itsiz*sizeof(struct h_t)); data/gplcver-2.12a/src/v_acc.c:3652:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->ihrectab, __aithrectab, itsiz*sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_acc.c:3968:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(__aithtab[iti2]), iterp->scanhtab, itsiz*sizeof(struct h_t)); data/gplcver-2.12a/src/v_acc.c:3969:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(__aithrectab[iti2]), iterp->ihrectab, data/gplcver-2.12a/src/v_acc.c:4613:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->scanhtab, __aithtab2, cnum*sizeof(struct h_t)); data/gplcver-2.12a/src/v_acc.c:4614:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->ihrectab, __aithrectab2, cnum*sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_acc.c:4900:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->scanhtab, __aithtab2, iti3*sizeof(struct h_t)); data/gplcver-2.12a/src/v_acc.c:4901:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->ihrectab, __aithrectab2, iti3*sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_acc.c:5052:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->scanhtab, __aithtab, iti2*sizeof(struct h_t)); data/gplcver-2.12a/src/v_acc.c:5053:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->ihrectab, __aithrectab, iti2*sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_acc.c:5168:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->scanhtab, __aithtab, nbits*sizeof(struct h_t)); data/gplcver-2.12a/src/v_acc.c:5169:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->ihrectab, __aithrectab, nbits*sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_acc.c:5292:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->scanhtab, __aithtab, iti2*sizeof(struct h_t)); data/gplcver-2.12a/src/v_acc.c:5293:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->ihrectab, __aithrectab, iti2*sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_acc.c:5741:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->scanhtab, __aithtab, iti2*sizeof(struct h_t)); data/gplcver-2.12a/src/v_acc.c:5742:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->ihrectab, __aithrectab, iti2*sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_acc.c:5828:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *chp, s1[RECLEN]; data/gplcver-2.12a/src/v_acc.c:6307:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_acc.c:6355:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_acc.c:6357:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (is_append) strcpy(s1, "acc_append_delays"); data/gplcver-2.12a/src/v_acc.c:6358:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "acc_replace_delays"); data/gplcver-2.12a/src/v_acc.c:6898:20: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case accNoDelay: strcpy(s, "accNoDelay"); break; data/gplcver-2.12a/src/v_acc.c:6899:26: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case accInertialDelay: strcpy(s, "accInertialDelay"); break; data/gplcver-2.12a/src/v_acc.c:6900:27: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case accTransportDelay: strcpy(s, "accTransportDelay"); break; data/gplcver-2.12a/src/v_acc.c:6901:31: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case accPureTransportDelay: strcpy(s, "accPureTransportDelay"); break; data/gplcver-2.12a/src/v_acc.c:6902:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case accForceFlag: strcpy(s, "accForceFlag"); break; data/gplcver-2.12a/src/v_acc.c:6903:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case accReleaseFlag: strcpy(s, "accReleaseFlag"); break; data/gplcver-2.12a/src/v_acc.c:6904:23: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case accAssignFlag: strcpy(s, "accAssignFlag"); break; data/gplcver-2.12a/src/v_acc.c:6905:25: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case accDeassignFlag: strcpy(s, "accDeassignFlag"); break; data/gplcver-2.12a/src/v_acc.c:6906:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. default: sprintf(s, "[?? Unknown: %d]", accdmode); break; data/gplcver-2.12a/src/v_acc.c:7116:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_acc.c:7713:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_acc.c:8048:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s, "**UNKNOWN**"); data/gplcver-2.12a/src/v_acc.c:8211:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *chp, s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_acc.c:8308:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s2, " ["); data/gplcver-2.12a/src/v_acc.c:8312:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "index=%d", hrp->hi); data/gplcver-2.12a/src/v_acc.c:8318:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (!first_time) strcat(s2, ", "); else first_time = FALSE; data/gplcver-2.12a/src/v_acc.c:8319:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(s2, "in interator"); data/gplcver-2.12a/src/v_acc.c:8323:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (!first_time) strcat(s2, ", "); else first_time = FALSE; data/gplcver-2.12a/src/v_acc.c:8324:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(s2, "Created object"); data/gplcver-2.12a/src/v_acc.c:8328:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (!first_time) strcat(s2, ", "); else first_time = FALSE; data/gplcver-2.12a/src/v_acc.c:8329:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "Scheduled event done=%d", hrp->evnt_done); data/gplcver-2.12a/src/v_acc.c:8334:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (!first_time) strcat(s2, ", "); else first_time = FALSE; data/gplcver-2.12a/src/v_acc.c:8335:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(s2, "Variable index"); data/gplcver-2.12a/src/v_acc.c:8372:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__wrks1, "** NULL OR LOW NUMBER **"); data/gplcver-2.12a/src/v_acc.c:8382:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__wrks1, "** PTR INTO DATA BASE ILLEGAL **"); data/gplcver-2.12a/src/v_acc.c:8387:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(__wrks1, "underlying vpi: %d", hrp->htyp); data/gplcver-2.12a/src/v_acc.c:8411:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s, "**out of range or invalid (vpi_ type %lu)", vpioval); data/gplcver-2.12a/src/v_acc.c:8464:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_acc.c:8478:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpis1[IDLEN], vpis2[4*IDLEN], *vpichp; data/gplcver-2.12a/src/v_acc.c:8526:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_acc.c:8539:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpis1[IDLEN], vpis2[4*IDLEN], *vpichp; data/gplcver-2.12a/src/v_acc.c:8584:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_acc.c:8596:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpis1[IDLEN], vpis2[4*IDLEN], *vpichp; data/gplcver-2.12a/src/v_acc.c:8644:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_acc.c:8656:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpis1[IDLEN], vpis2[4*IDLEN], *vpichp; data/gplcver-2.12a/src/v_cnv.c:276:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:450:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rfmtstr[RECLEN], s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:573:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tfmtstr[IDLEN]; data/gplcver-2.12a/src/v_cnv.c:622:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, ap, sizeof(double)); data/gplcver-2.12a/src/v_cnv.c:664:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rfmtstr[RECLEN], s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:783:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s1, " (pos. %d)", fmt_pos); data/gplcver-2.12a/src/v_cnv.c:1050:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ch, *chp, *chp2, s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:1074:25: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (blen == WBITS) sprintf(s1, "%ld", (sword32) ap[0]); data/gplcver-2.12a/src/v_cnv.c:1091:27: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (sval == 0) sprintf(s1, "-%ld", ap[0]); data/gplcver-2.12a/src/v_cnv.c:1092:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s1, "-%ld", sval); data/gplcver-2.12a/src/v_cnv.c:1095:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s1, "%lu", ap[0]); data/gplcver-2.12a/src/v_cnv.c:1098:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s1, "%lu", ap[0]); data/gplcver-2.12a/src/v_cnv.c:1146:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "%lu", ap[0]); data/gplcver-2.12a/src/v_cnv.c:1211:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s, "%llu", t1); data/gplcver-2.12a/src/v_cnv.c:1266:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:1268:42: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (fmt_pos == -1) strcpy(s1, ""); else sprintf(s1, " (pos. %d)", fmt_pos); data/gplcver-2.12a/src/v_cnv.c:1270:19: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (xp->is_real) memcpy(&d1, ap, sizeof(double)); data/gplcver-2.12a/src/v_cnv.c:1335:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *chp, s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:1345:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, wp, 2*wlen_(tfrp->fretsiz)*WRDBYTES); data/gplcver-2.12a/src/v_cnv.c:1378:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_cnv.c:1400:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "%g", d1); data/gplcver-2.12a/src/v_cnv.c:1588:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:1612:8: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "%03o", *chp); data/gplcver-2.12a/src/v_cnv.c:1827:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[10]; data/gplcver-2.12a/src/v_cnv.c:1873:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:1895:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "%g", d1); data/gplcver-2.12a/src/v_cnv.c:1923:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else { sprintf(s1, "%d'd", ndp->szu.xclen); __adds(s1); } data/gplcver-2.12a/src/v_cnv.c:1931:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else { sprintf(s1, "%d'h", ndp->szu.xclen); __adds(s1); } data/gplcver-2.12a/src/v_cnv.c:1936:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else { sprintf(s1, "%d'o", ndp->szu.xclen); __adds(s1); } data/gplcver-2.12a/src/v_cnv.c:1941:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else { sprintf(s1, "%d'b", ndp->szu.xclen); __adds(s1); } data/gplcver-2.12a/src/v_cnv.c:1960:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:1962:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, "..."); data/gplcver-2.12a/src/v_cnv.c:1990:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:1992:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, "..."); data/gplcver-2.12a/src/v_cnv.c:2122:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:2133:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, ap, sizeof(double)); data/gplcver-2.12a/src/v_cnv.c:2135:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "%g", d1); data/gplcver-2.12a/src/v_cnv.c:2168:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:2253:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:2263:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, &(np->nva.wp[2*__inum]), sizeof(double)); data/gplcver-2.12a/src/v_cnv.c:2264:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "%g", d1); data/gplcver-2.12a/src/v_cnv.c:2276:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, "[first of entire array]: "); data/gplcver-2.12a/src/v_cnv.c:2333:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:2457:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:2551:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN], s4[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:2581:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case XNP_LOC: strcpy(s4, "-LOCAL-"); break; data/gplcver-2.12a/src/v_cnv.c:2582:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case XNP_DOWNXMR: strcpy(s4, "-DOWNXMR-"); break; data/gplcver-2.12a/src/v_cnv.c:2583:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case XNP_RTXMR: strcpy(s4, "-RTXMR-"); break; data/gplcver-2.12a/src/v_cnv.c:2584:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case XNP_UPXMR: strcpy(s4, "-UPXMR-"); break; data/gplcver-2.12a/src/v_cnv.c:2628:23: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (tfrp->tf_func) strcpy(s1, "function"); else strcpy(s1, "task"); data/gplcver-2.12a/src/v_cnv.c:2628:52: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (tfrp->tf_func) strcpy(s1, "function"); else strcpy(s1, "task"); data/gplcver-2.12a/src/v_cnv.c:2634:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__xs, "vpiWireDriver"); data/gplcver-2.12a/src/v_cnv.c:2635:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(__xs, "vpiWireBitDriver"); data/gplcver-2.12a/src/v_cnv.c:2706:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:3242:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_cnv.c:3280:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_cnv.c:3336:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_cnv.c:3528:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:3671:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:3764:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:3800:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char wnam[RECLEN], s1[IDLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:3901:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:3916:37: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (parm_np->ntyp == N_REAL) strcpy(s1, " real"); data/gplcver-2.12a/src/v_cnv.c:3917:41: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (parm_np->ntyp == N_INT) strcpy(s1, " integer"); data/gplcver-2.12a/src/v_cnv.c:3918:42: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (parm_np->ntyp == N_TIME) strcpy(s1, " time"); data/gplcver-2.12a/src/v_cnv.c:4086:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:4102:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, " [%d:%d]", giap->gia1, giap->gia2); data/gplcver-2.12a/src/v_cnv.c:4144:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:4159:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. { sprintf(s1, "%d'h", xsp->xslen); __wrap_puts(s1, f); } data/gplcver-2.12a/src/v_cnv.c:4188:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:4203:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. { sprintf(s1, "%d'h", xsp->xslen); __wrap_puts(s1, f); } data/gplcver-2.12a/src/v_cnv.c:4261:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *chp, s1[IDLEN]; data/gplcver-2.12a/src/v_cnv.c:4379:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:4409:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, " [%d:%d]", giap->gia1, giap->gia2); data/gplcver-2.12a/src/v_cnv.c:4439:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:4476:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:4499:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:4674:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN], s4[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:4803:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ftyp[RECLEN], s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:4809:26: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (np->ntyp == N_REAL) strcpy(ftyp, "real"); data/gplcver-2.12a/src/v_cnv.c:4810:30: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (np->ntyp == N_INT) strcpy(ftyp, "integer"); data/gplcver-2.12a/src/v_cnv.c:4811:31: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (np->ntyp == N_TIME) strcpy(ftyp, "time"); data/gplcver-2.12a/src/v_cnv.c:4867:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:4917:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:4981:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:5077:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:5082:34: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (pelp->pthi1 == pelp->pthi2) sprintf(s1, "[%d]", pelp->pthi1); data/gplcver-2.12a/src/v_cnv.c:5083:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s1, "[%d:%d]", pelp->pthi1, pelp->pthi2); data/gplcver-2.12a/src/v_cnv.c:5093:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:5133:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:5148:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:5176:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:5201:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:5203:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (stp->st.scs.castyp == CASEZ) strcpy(s1, "casez"); data/gplcver-2.12a/src/v_cnv.c:5204:40: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (stp->st.scs.castyp == CASEX) strcpy(s1, "casex"); data/gplcver-2.12a/src/v_cnv.c:5205:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "case"); data/gplcver-2.12a/src/v_cnv.c:5225:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:5251:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "%lu", (word32) du.dis1v1[0]); data/gplcver-2.12a/src/v_cnv.c:5255:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "%lu", (word32) du.dis1v2[0]); data/gplcver-2.12a/src/v_cnv.c:5283:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "(%lu, %lu, %lu)", (word32) du.dis4v1[1], data/gplcver-2.12a/src/v_cnv.c:5289:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "(%lu, %lu, %lu)", (word32) du.dis4v2[1], data/gplcver-2.12a/src/v_cnv.c:5594:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s, "[%d:%d]", r1, r2); data/gplcver-2.12a/src/v_cnv.c:5621:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s, "[%d:%d]", r1, r2); data/gplcver-2.12a/src/v_cnv.c:5665:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:5714:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "%d", indv); data/gplcver-2.12a/src/v_cnv.c:5733:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "%d:%d]", ind1, ind2); data/gplcver-2.12a/src/v_cnv.c:6215:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. dump_nest_vpi_argv(1, (char **) argv[i + 1]); data/gplcver-2.12a/src/v_cnv.c:6238:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. dump_nest_vpi_argv(lev + 1, (char **) argv[i + 1]); data/gplcver-2.12a/src/v_cnv.c:6251:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_cnv.c:6254:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (olp->is_bmark) strcpy(s1, "BMARK"); data/gplcver-2.12a/src/v_cnv.c:6255:26: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (olp->is_emark) strcpy(s1, "EMARK"); data/gplcver-2.12a/src/v_cnv.c:6256:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "NONE"); data/gplcver-2.12a/src/v_dbg.c:211:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_dbg.c:429:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_dbg.c:758:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_dbg.c:1038:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(__iact_mdp->mgrtab, __grwrktab, data/gplcver-2.12a/src/v_dbg.c:1048:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(__iact_mdp->mgrtab[__iact_mdp->mgrnum]), __grwrktab, data/gplcver-2.12a/src/v_dbg.c:1593:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_dbg.c:1617:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c, save_ch, *chp, *chp2, s1[RECLEN]; data/gplcver-2.12a/src/v_dbg.c:1623:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "C%d%c ", iahi, c); data/gplcver-2.12a/src/v_dbg.c:1809:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[IDLEN]; data/gplcver-2.12a/src/v_dbg.c:2091:13: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else { strcat(s, ", "); strcat(s, cmdtab[i].lnam); } data/gplcver-2.12a/src/v_dbg.c:2886:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_dbg.c:3058:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[IDLEN]; data/gplcver-2.12a/src/v_dbg.c:3069:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s, "%g", d1); data/gplcver-2.12a/src/v_dbg.c:3088:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s, "\\%x", (int32) av); data/gplcver-2.12a/src/v_dbg.c:3089:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s, "%c", (char) av); data/gplcver-2.12a/src/v_dbg.c:3259:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_dbg.c:3281:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_dbg.c:3284:14: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case BBIN: strcpy(s, " /b"); break; data/gplcver-2.12a/src/v_dbg.c:3285:14: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case BHEX: strcpy(s, " /x"); break; data/gplcver-2.12a/src/v_dbg.c:3287:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (force_unsign) strcpy(s, " /u"); data/gplcver-2.12a/src/v_dbg.c:3288:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s, " /d"); break; data/gplcver-2.12a/src/v_dbg.c:3289:14: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case BOCT: strcpy(s, " /o"); break; data/gplcver-2.12a/src/v_dbg.c:3290:14: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case BSTR: strcpy(s, " /s"); break; data/gplcver-2.12a/src/v_dbg.c:3291:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case BCHAR: strcpy(s, " /c"); break; data/gplcver-2.12a/src/v_dbg.c:3313:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_dbg.c:3328:20: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (xp->has_sign) strcat(s, " signed"); data/gplcver-2.12a/src/v_dbg.c:3331:23: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (xp->is_string) strcat(s, " string"); data/gplcver-2.12a/src/v_dbg.c:3332:23: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (!xp->unsiznum) strcat(s, " explicit width"); data/gplcver-2.12a/src/v_dbg.c:3333:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (xp->sizdflt) strcat(s, " default width"); data/gplcver-2.12a/src/v_dbg.c:3335:19: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (xp->is_real) strcat(s, " real"); data/gplcver-2.12a/src/v_dbg.c:3336:20: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (xp->x_multfi) strcat(s, " fi>1 or tran wire"); data/gplcver-2.12a/src/v_dbg.c:3337:19: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (xp->x_stren) strcat(s, " has strength wire"); data/gplcver-2.12a/src/v_dbg.c:3338:19: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (xp->tf_isrw) strcat(s, " tf_ argument lvalue"); data/gplcver-2.12a/src/v_dbg.c:3339:22: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (xp->locqualnam) strcat(s, " local qualified name"); data/gplcver-2.12a/src/v_dbg.c:3383:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_dbg.c:3396:25: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (syp->sy_giabase) strcat(s1, " (array of primitives base)"); data/gplcver-2.12a/src/v_dbg.c:3403:25: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (syp->sy_giabase) strcat(s1, " (instance array base)"); data/gplcver-2.12a/src/v_dbg2.c:571:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ctab[8]; data/gplcver-2.12a/src/v_dbg2.c:725:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[RDBUFSIZ]; data/gplcver-2.12a/src/v_dbg2.c:948:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_dbg2.c:1003:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_dbg2.c:1016:32: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. { if (bpp->bp_rm_when_hit) strcpy(s1, "del "); else strcpy(s1, "keep"); } data/gplcver-2.12a/src/v_dbg2.c:1016:57: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. { if (bpp->bp_rm_when_hit) strcpy(s1, "del "); else strcpy(s1, "keep"); } data/gplcver-2.12a/src/v_dbg2.c:1017:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "dis "); data/gplcver-2.12a/src/v_dbg2.c:1052:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case BP_INST: strcpy(s, "Inst"); break; data/gplcver-2.12a/src/v_dbg2.c:1053:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case BP_TYPE: strcpy(s, "Type"); break; data/gplcver-2.12a/src/v_dbg2.c:1064:14: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case BBIN: strcpy(s, "binary"); break; data/gplcver-2.12a/src/v_dbg2.c:1065:14: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case BHEX: strcpy(s, "hex"); break; data/gplcver-2.12a/src/v_dbg2.c:1066:14: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case BOCT: strcpy(s, "octal"); break; data/gplcver-2.12a/src/v_dbg2.c:1067:14: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case BDEC: strcpy(s, "decimal"); break; data/gplcver-2.12a/src/v_dbg2.c:1079:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_dbg2.c:1157:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *savchp, *endchp, sref[RECLEN]; data/gplcver-2.12a/src/v_dbg2.c:1256:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_dbg2.c:1340:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_dbg2.c:1380:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(wrksym.synam, "** DBG SCOPE WRK**"); data/gplcver-2.12a/src/v_dbg2.c:1796:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_dbg2.c:1798:14: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (is_tmp) strcpy(s1, ":tbreakpoint"); else strcpy(s1, ":breakpoint"); data/gplcver-2.12a/src/v_dbg2.c:1798:47: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (is_tmp) strcpy(s1, ":tbreakpoint"); else strcpy(s1, ":breakpoint"); data/gplcver-2.12a/src/v_dbg2.c:1867:14: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (is_tmp) strcpy(s2, " (temp)"); else strcpy(s2, ""); data/gplcver-2.12a/src/v_dbg2.c:1918:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_dbg2.c:1920:14: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (is_tmp) strcpy(s1, ":tibreakpoint"); else strcpy(s1, ":ibreakpoint"); data/gplcver-2.12a/src/v_dbg2.c:1920:48: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (is_tmp) strcpy(s1, ":tibreakpoint"); else strcpy(s1, ":ibreakpoint"); data/gplcver-2.12a/src/v_dbg2.c:2028:14: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (is_tmp) strcpy(s1, " (temp)"); else strcpy(s1, ""); data/gplcver-2.12a/src/v_dbg2.c:2047:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sref[RECLEN]; data/gplcver-2.12a/src/v_dbg2.c:2512:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_dbg2.c:2607:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_dbg2.c:2664:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_dbg2.c:2666:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (do_enable) strcpy(s1, "enable"); else strcpy(s1, "disable"); data/gplcver-2.12a/src/v_dbg2.c:2666:44: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (do_enable) strcpy(s1, "enable"); else strcpy(s1, "disable"); data/gplcver-2.12a/src/v_dbg2.c:3002:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_dbg2.c:3398:28: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (__inst_ptr == NULL) strcpy(__xs, "<none>"); data/gplcver-2.12a/src/v_dbg2.c:3460:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_dbg2.c:3466:37: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if ((stp = thp->thnxtstp) == NULL) strcpy(s1, "**END**"); data/gplcver-2.12a/src/v_dbg2.c:3528:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_dbg2.c:3588:32: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (tevp->tetyp == TE_WIRE) strcpy(s2, "wire event"); data/gplcver-2.12a/src/v_dbg2.c:3589:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s2, "inout path dest. event"); data/gplcver-2.12a/src/v_dbg2.c:3646:39: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (tfap->anp->ntyp >= NONWIRE_ST) strcpy(__xs, "procedural assign of"); data/gplcver-2.12a/src/v_dbg2.c:3647:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(__xs, "tf_ driver is"); data/gplcver-2.12a/src/v_dbg2.c:3932:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_dbg2.c:3934:29: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (thp->thnxtstp == NULL) strcpy(s2, "**at end"); data/gplcver-2.12a/src/v_dbg2.c:3955:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "not waiting for event ctrl"); data/gplcver-2.12a/src/v_del.c:297:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_del.c:436:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_del.c:542:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, "annotate first timing check limit"); data/gplcver-2.12a/src/v_del.c:545:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, "annotate second timing check limit"); data/gplcver-2.12a/src/v_del.c:587:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN], s4[10]; data/gplcver-2.12a/src/v_del.c:589:45: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (itp == NULL) { itp2 = mdp->moditps[0]; sprintf(s1, "'*' first"); } data/gplcver-2.12a/src/v_del.c:591:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (from_vpi) strcpy(s4, "VPI_ PLI"); else strcpy(s4, "SDF"); data/gplcver-2.12a/src/v_del.c:591:45: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (from_vpi) strcpy(s4, "VPI_ PLI"); else strcpy(s4, "SDF"); data/gplcver-2.12a/src/v_del.c:608:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN], s4[10]; data/gplcver-2.12a/src/v_del.c:610:45: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (itp == NULL) { itp2 = mdp->moditps[0]; sprintf(s1, "'*' first"); } data/gplcver-2.12a/src/v_del.c:612:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (from_vpi) strcpy(s4, "VPI_ PLI"); else strcpy(s4, "SDF"); data/gplcver-2.12a/src/v_del.c:612:45: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (from_vpi) strcpy(s4, "VPI_ PLI"); else strcpy(s4, "SDF"); data/gplcver-2.12a/src/v_del.c:629:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN], s4[10]; data/gplcver-2.12a/src/v_del.c:631:45: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (itp == NULL) { itp2 = mdp->moditps[0]; sprintf(s1, "'*' first"); } data/gplcver-2.12a/src/v_del.c:633:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (from_vpi) strcpy(s4, "VPI_ PLI"); else strcpy(s4, "SDF"); data/gplcver-2.12a/src/v_del.c:633:45: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (from_vpi) strcpy(s4, "VPI_ PLI"); else strcpy(s4, "SDF"); data/gplcver-2.12a/src/v_del.c:650:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN], s4[10]; data/gplcver-2.12a/src/v_del.c:652:45: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (itp == NULL) { itp2 = mdp->moditps[0]; sprintf(s1, "'*' first"); } data/gplcver-2.12a/src/v_del.c:654:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (from_vpi) strcpy(s4, "VPI_ PLI"); else strcpy(s4, "SDF"); data/gplcver-2.12a/src/v_del.c:654:45: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (from_vpi) strcpy(s4, "VPI_ PLI"); else strcpy(s4, "SDF"); data/gplcver-2.12a/src/v_del.c:679:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN], s4[10]; data/gplcver-2.12a/src/v_del.c:681:45: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (itp == NULL) { itp2 = mdp->moditps[0]; sprintf(s1, "'*' first"); } data/gplcver-2.12a/src/v_del.c:683:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (from_vpi) strcpy(s4, "VPI_ PLI"); else strcpy(s4, "SDF"); data/gplcver-2.12a/src/v_del.c:683:45: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (from_vpi) strcpy(s4, "VPI_ PLI"); else strcpy(s4, "SDF"); data/gplcver-2.12a/src/v_del.c:699:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[10], s3[RECLEN], s4[RECLEN], s5[10]; data/gplcver-2.12a/src/v_del.c:701:45: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (itp == NULL) { itp2 = mdp->moditps[0]; sprintf(s1, "'*' first"); } data/gplcver-2.12a/src/v_del.c:703:49: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (pnptyp == PNP_TCHKP1) strcpy(s2, ""); else strcpy(s2, " 2nd"); data/gplcver-2.12a/src/v_del.c:704:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (from_vpi) strcpy(s5, "VPI_ PLI"); else strcpy(s5, "SDF"); data/gplcver-2.12a/src/v_del.c:704:45: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (from_vpi) strcpy(s5, "VPI_ PLI"); else strcpy(s5, "SDF"); data/gplcver-2.12a/src/v_del.c:1086:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dtab2, dtab, nbytes); data/gplcver-2.12a/src/v_del.c:1365:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dtab2, dtab, nbytes); data/gplcver-2.12a/src/v_del.c:1532:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dtab2, dtab, nbytes); data/gplcver-2.12a/src/v_del.c:2470:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_del.c:2511:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case DT_CMPLST: strcpy(s, "**WRONG SOURCE FORM LIST**"); break; data/gplcver-2.12a/src/v_del.c:2512:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case DT_PTHDST: strcpy(s, "**PATH DESTIONATION PLACE HOLDER**"); break; data/gplcver-2.12a/src/v_del.c:2513:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case DT_NONE: strcpy(s, "**NO DELAY**"); break; data/gplcver-2.12a/src/v_ex.c:555:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_ex.c:637:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:694:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:1049:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:1115:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:1226:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_ex.c:1231:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, "assign"); data/gplcver-2.12a/src/v_ex.c:1232:28: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (__force_active) strcpy(s2, " [active force effect hidden]"); data/gplcver-2.12a/src/v_ex.c:1236:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, "force"); data/gplcver-2.12a/src/v_ex.c:1237:29: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (__assign_active) strcpy(s2, " [assign value saved]"); data/gplcver-2.12a/src/v_ex.c:1259:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_ex.c:1264:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, "deassign"); data/gplcver-2.12a/src/v_ex.c:1265:28: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (__force_active) strcpy(s2, " [active force effect hidden]"); data/gplcver-2.12a/src/v_ex.c:1269:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, "release"); data/gplcver-2.12a/src/v_ex.c:1270:29: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (__assign_active) strcpy(s2, " [assign value restored]"); data/gplcver-2.12a/src/v_ex.c:1570:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, xsp->ap, bytes); data/gplcver-2.12a/src/v_ex.c:1617:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], vs2[10]; data/gplcver-2.12a/src/v_ex.c:1620:42: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (wp == NULL) strcpy(vs2, ""); else strcpy(vs2, "(rhs)"); data/gplcver-2.12a/src/v_ex.c:1665:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_ex.c:1735:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, xsp->ap, 2*wlen*WRDBYTES); data/gplcver-2.12a/src/v_ex.c:1918:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vs2[10]; data/gplcver-2.12a/src/v_ex.c:1921:42: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (wp == NULL) strcpy(vs2, ""); else strcpy(vs2, "(rhs)"); data/gplcver-2.12a/src/v_ex.c:1932:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_ex.c:1936:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "<none>"); data/gplcver-2.12a/src/v_ex.c:1954:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_ex.c:2132:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, selxsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:2145:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d2, itemxsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:2399:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:2426:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. { strcpy(__xs2, "--continuing"); rv = TRUE; goto tr_done; } data/gplcver-2.12a/src/v_ex.c:2459:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (__st_tracing) { strcpy(__xs2, "--suspend"); rv = FALSE; goto tr_done; } data/gplcver-2.12a/src/v_ex.c:2493:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { memcpy(&d1, xsp->ap, sizeof(double)); tmp = (d1 != 0.0); } data/gplcver-2.12a/src/v_ex.c:2553:30: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (tskp->tsktyp == FORK) strcpy(__xs, "fork"); data/gplcver-2.12a/src/v_ex.c:2554:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(__xs, "begin"); data/gplcver-2.12a/src/v_ex.c:2968:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_ex.c:2974:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "%d'h", xsp->xslen); data/gplcver-2.12a/src/v_ex.c:3008:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_ex.c:3042:8: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "%d'h", xsp->xslen); data/gplcver-2.12a/src/v_ex.c:3461:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:3490:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:3502:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:3506:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:3538:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:3544:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:3928:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format[RECLEN]; data/gplcver-2.12a/src/v_ex.c:4048:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:4154:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d2, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:4191:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:4214:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:4236:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:4243:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:4289:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d3, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:4308:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:4315:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:4320:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d3, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:4339:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:4346:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:4349:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d3, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:4368:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:4375:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:4378:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d3, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:5314:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(__xs2, "**past end"); data/gplcver-2.12a/src/v_ex.c:5334:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__tr_fnam, "stdout"); data/gplcver-2.12a/src/v_ex.c:6602:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_ex.c:6774:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:6847:34: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (strcmp(chp, "STDOUT") == 0) strcpy(chp, "stdout"); data/gplcver-2.12a/src/v_ex.c:7051:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char os_mode[RECLEN]; data/gplcver-2.12a/src/v_ex.c:7106:38: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (strcmp(ver_mode, "r+b") == 0) { strcpy(os_mode, "r+"); return(TRUE); } data/gplcver-2.12a/src/v_ex.c:7107:38: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (strcmp(ver_mode, "rb+") == 0) { strcpy(os_mode, "r+"); return(TRUE); } data/gplcver-2.12a/src/v_ex.c:7109:38: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (strcmp(ver_mode, "w+b") == 0) { strcpy(os_mode, "w+"); return(TRUE); } data/gplcver-2.12a/src/v_ex.c:7110:38: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (strcmp(ver_mode, "wb+") == 0) { strcpy(os_mode, "w+"); return(TRUE); } data/gplcver-2.12a/src/v_ex.c:7112:38: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (strcmp(ver_mode, "a+b") == 0) { strcpy(os_mode, "a+"); return(TRUE); } data/gplcver-2.12a/src/v_ex.c:7113:38: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (strcmp(ver_mode, "ab+") == 0) { strcpy(os_mode, "a+"); return(TRUE); } data/gplcver-2.12a/src/v_ex.c:7162:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. __my_free((char *) __fio_fdtab[fd], sizeof(struct fiofd_t)); data/gplcver-2.12a/src/v_ex.c:8036:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_ex.c:8569:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stren[RECLEN]; data/gplcver-2.12a/src/v_ex2.c:528:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_ex2.c:544:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (fmon_type) strcpy(s1, "$fmonitor"); else strcpy(s1, "$monitor"); data/gplcver-2.12a/src/v_ex2.c:544:47: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (fmon_type) strcpy(s1, "$fmonitor"); else strcpy(s1, "$monitor"); data/gplcver-2.12a/src/v_ex2.c:1002:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { chged = TRUE; memcpy(sbp, sbp2, dcewid); } data/gplcver-2.12a/src/v_ex2.c:1151:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(xsp->ap, &(__contab[ndp->ru.xvi]), data/gplcver-2.12a/src/v_ex2.c:1158:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &(__contab[ndp->ru.xvi]), data/gplcver-2.12a/src/v_ex2.c:1175:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &(wp[2*wlen*__inum]), 2*WRDBYTES*wlen); data/gplcver-2.12a/src/v_ex2.c:1181:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, wp, 2*WRDBYTES*wlen); data/gplcver-2.12a/src/v_ex2.c:1320:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rgap, rap, WRDBYTES*wlen); data/gplcver-2.12a/src/v_ex2.c:1321:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rgbp, &(rap[wlen]), WRDBYTES*wlen); data/gplcver-2.12a/src/v_ex2.c:1343:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rgap, xsp->ap, WRDBYTES*wlen); data/gplcver-2.12a/src/v_ex2.c:1344:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rgbp, xsp->bp, WRDBYTES*wlen); data/gplcver-2.12a/src/v_ex2.c:1354:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rgap, xsp->ap, WRDBYTES*wlen); data/gplcver-2.12a/src/v_ex2.c:1355:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rgbp, xsp->bp, WRDBYTES*wlen); data/gplcver-2.12a/src/v_ex2.c:1361:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rgap, wp, WRDBYTES*wlen); data/gplcver-2.12a/src/v_ex2.c:1362:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rgbp, &(wp[wlen]), WRDBYTES*wlen); data/gplcver-2.12a/src/v_ex2.c:1367:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rgap, wp, WRDBYTES*wlen); data/gplcver-2.12a/src/v_ex2.c:1368:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rgbp, &(wp[wlen]), WRDBYTES*wlen); data/gplcver-2.12a/src/v_ex2.c:1392:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rgap, rap, WRDBYTES*wlen); data/gplcver-2.12a/src/v_ex2.c:1393:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rgbp, &(rap[wlen]), WRDBYTES*wlen); data/gplcver-2.12a/src/v_ex2.c:1941:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_ex2.c:1995:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "$readmem%c start", __to_baselet(base)); data/gplcver-2.12a/src/v_ex2.c:2013:8: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "$readmem%c end", __to_baselet(base)); data/gplcver-2.12a/src/v_ex2.c:2154:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, __acwrk, nbytes); data/gplcver-2.12a/src/v_ex2.c:2155:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->bp, __bcwrk, nbytes); data/gplcver-2.12a/src/v_ex2.c:2509:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_ex2.c:2545:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "$sreadmem%c start", __to_baselet(base)); data/gplcver-2.12a/src/v_ex2.c:2560:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "$sreadmem%c end", __to_baselet(base)); data/gplcver-2.12a/src/v_ex2.c:2713:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, __acwrk, nbytes); data/gplcver-2.12a/src/v_ex2.c:2714:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->bp, __bcwrk, nbytes); data/gplcver-2.12a/src/v_ex2.c:3783:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xspq->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:3796:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:3810:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:3826:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xspq->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:3878:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xspq->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:3894:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:3907:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4044:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4046:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4062:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4474:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4477:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4483:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp1->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4520:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4523:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4526:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp1->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4573:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4576:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4580:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp1->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4630:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4633:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4637:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp1->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4742:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4745:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4778:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4780:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4812:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4814:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4846:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4849:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4910:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4913:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4977:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:4979:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5050:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5052:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5070:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5072:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5591:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5594:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5600:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp1->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5607:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5610:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5613:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp1->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5620:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5623:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5626:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp1->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5633:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5636:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5639:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp1->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5646:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5648:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5656:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5659:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5667:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5670:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5678:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5681:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5691:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5694:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5705:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5707:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5717:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5720:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5729:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d1, xsp1->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:5732:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_ex2.c:6479:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(res, wp, ((wlen < prodwlen) ? wlen : prodwlen)*WRDBYTES); data/gplcver-2.12a/src/v_ex2.c:6656:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vwp, v, vwlen*WRDBYTES); data/gplcver-2.12a/src/v_ex2.c:6664:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(uwp, u, uwlen*WRDBYTES); data/gplcver-2.12a/src/v_ex2.c:6793:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rem, ztmp1, ztmp1_len*WRDBYTES); data/gplcver-2.12a/src/v_ex3.c:532:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_ex3.c:569:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_ex3.c:600:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_ex3.c:635:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, " force active"); data/gplcver-2.12a/src/v_ex3.c:639:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s2[RECLEN]; data/gplcver-2.12a/src/v_ex3.c:675:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_ex3.c:699:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(s1, " replace force"); data/gplcver-2.12a/src/v_ex3.c:714:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(s1, " override assign"); data/gplcver-2.12a/src/v_ex3.c:730:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s2[RECLEN]; data/gplcver-2.12a/src/v_ex3.c:774:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_ex3.c:820:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, " reactivating assign"); data/gplcver-2.12a/src/v_ex3.c:827:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s2[RECLEN]; data/gplcver-2.12a/src/v_ex3.c:962:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_ex3.c:1007:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_ex3.c:1142:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_ex3.c:1168:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s2[RECLEN]; data/gplcver-2.12a/src/v_ex3.c:1187:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, " - no bits forced"); data/gplcver-2.12a/src/v_ex3.c:1198:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s2[RECLEN]; data/gplcver-2.12a/src/v_ex3.c:1229:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, " - some bits forced"); data/gplcver-2.12a/src/v_ex3.c:1287:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_ex3.c:1464:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(__xs, "[%d]", qcvalp->qclhsbi); data/gplcver-2.12a/src/v_ex3.c:2088:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_ex3.c:2580:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], vs1[10], vs2[10], vs3[10]; data/gplcver-2.12a/src/v_ex3.c:2831:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], vs1[10], vs2[10], vs3[10]; data/gplcver-2.12a/src/v_ex3.c:2843:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, " (pending event)"); data/gplcver-2.12a/src/v_ex3.c:3061:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_ex3.c:3080:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[10], s4[10], s5[10], s6[RECLEN]; data/gplcver-2.12a/src/v_ex3.c:3085:25: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (__showe_onevent) strcpy(s1, " - edge event to x"); data/gplcver-2.12a/src/v_ex3.c:3086:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, " - now detect to x"); data/gplcver-2.12a/src/v_ex3.c:3114:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[10], s4[10], s5[10], s6[RECLEN]; data/gplcver-2.12a/src/v_ex3.c:3119:25: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (__showe_onevent) strcpy(s1, " - edge event to x"); data/gplcver-2.12a/src/v_ex3.c:3120:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, " - now detect to x"); data/gplcver-2.12a/src/v_ex3.c:3225:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_ex3.c:3305:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_ex3.c:3482:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_ex3.c:3583:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], vs1[10], vs2[10], vs3[10]; data/gplcver-2.12a/src/v_ex3.c:3669:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s2[RECLEN]; data/gplcver-2.12a/src/v_ex3.c:3750:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(np->nva.bp[np->nwid*__inum]), rgap, np->nwid); data/gplcver-2.12a/src/v_ex3.c:3828:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(netsbp, newsbp, np->nwid); data/gplcver-2.12a/src/v_ex3.c:4841:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(netsbp, newsbp, numbits); data/gplcver-2.12a/src/v_ex3.c:5090:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wpna, xsp->ap, WRDBYTES*xsp->xsawlen); data/gplcver-2.12a/src/v_ex3.c:5094:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wpnb, xsp->bp, WRDBYTES*xsp->xsawlen); data/gplcver-2.12a/src/v_ex3.c:5168:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wpna, xsp->ap, WRDBYTES*xsp->xsawlen); data/gplcver-2.12a/src/v_ex3.c:5172:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wpnb, xsp->bp, WRDBYTES*xsp->xsawlen); data/gplcver-2.12a/src/v_ex3.c:5277:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wpna, xsp->ap, WRDBYTES*xsp->xsawlen); data/gplcver-2.12a/src/v_ex3.c:5280:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wpnb, xsp->bp, WRDBYTES*xsp->xsawlen); data/gplcver-2.12a/src/v_ex3.c:5749:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ap, rap, WRDBYTES*wlen); data/gplcver-2.12a/src/v_ex3.c:5750:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bp, &(rap[wlen]), WRDBYTES*wlen); data/gplcver-2.12a/src/v_ex4.c:744:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_ex4.c:759:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN], s4[RECLEN]; data/gplcver-2.12a/src/v_ex4.c:962:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_ex4.c:964:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (xp->x_stren) strcpy(s2, "strength "); else strcpy(s2, ""); data/gplcver-2.12a/src/v_ex4.c:1011:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sbp, bp, rhsx->szu.xclen); data/gplcver-2.12a/src/v_ex4.c:1287:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sbp, bp, rhsx->szu.xclen); data/gplcver-2.12a/src/v_ex4.c:1551:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(abp, sbp, np->nwid); data/gplcver-2.12a/src/v_ex4.c:1582:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_ex4.c:1584:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (np->n_stren) strcpy(s1, " strength"); else strcpy(s1, ""); data/gplcver-2.12a/src/v_ex4.c:1633:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_ex4.c:1635:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (np->n_stren) strcpy(s1, " strength"); else strcpy(s1, ""); data/gplcver-2.12a/src/v_ex4.c:2451:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_ex4.c:2797:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sbp, sbp2, blen); data/gplcver-2.12a/src/v_ex4.c:2829:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sbp, sbp2, np->nwid); data/gplcver-2.12a/src/v_ex4.c:3077:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sbp, bp, ndp->szu.xclen); data/gplcver-2.12a/src/v_ex4.c:3174:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sbp, &(abp[bi2]), ndp->szu.xclen); data/gplcver-2.12a/src/v_ex4.c:3399:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vs1[10], vs2[10], vs3[10]; data/gplcver-2.12a/src/v_ex4.c:3431:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[10], s3[10], s4[10]; data/gplcver-2.12a/src/v_ex4.c:3565:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_ex4.c:3633:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_ex4.c:3660:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. { sprintf(__xs, ", ... <%d more>", arrwid - obwid); __adds(__xs); } data/gplcver-2.12a/src/v_ex4.c:3729:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ndxs[RECLEN], s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_ex4.c:3747:18: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (i1 == i2) sprintf(ndxs, " [%d]", __unmap_ndx(i1, ri1, ri2)); data/gplcver-2.12a/src/v_ex4.c:3748:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(ndxs, " [%d:%d]", __unmap_ndx(i1, ri1, ri2), data/gplcver-2.12a/src/v_ex4.c:3804:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s2, "1 bit continuous assign"); data/gplcver-2.12a/src/v_ex4.c:4091:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_ex4.c:4101:27: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (tevp->outv == 0) strcpy(s1, "**OFF**"); data/gplcver-2.12a/src/v_ex4.c:4102:32: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (tevp->outv == 1) strcpy(s1, "**ON**"); data/gplcver-2.12a/src/v_ex4.c:4103:11: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**UNKNOWN**"); data/gplcver-2.12a/src/v_ex4.c:4139:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, "*NONE*"); data/gplcver-2.12a/src/v_ex4.c:4153:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN], s4[RECLEN], s5[RECLEN]; data/gplcver-2.12a/src/v_ex4.c:4175:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_ex4.c:4179:20: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (np->n_signed) strcat(s, " signed"); data/gplcver-2.12a/src/v_ex4.c:4180:41: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (np->n_isavec && !np->vec_scalared) strcat(s, " vectored"); data/gplcver-2.12a/src/v_ex4.c:4183:47: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (np->nu.rngdwir->n_delrep == DT_PTHDST) strcat(s, " path dest."); data/gplcver-2.12a/src/v_ex4.c:4184:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else strcat(s, " delay"); data/gplcver-2.12a/src/v_ex4.c:4186:23: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (np->n_isapthsrc) strcat(s, " path src."); data/gplcver-2.12a/src/v_ex4.c:4187:19: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (np->n_stren) strcat(s, " strength"); data/gplcver-2.12a/src/v_ex4.c:4194:20: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (np->n_multfi) strcat(s, " multi-fi"); data/gplcver-2.12a/src/v_ex4.c:4195:26: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (np->ntraux != NULL) strcat(s, " in tran channel"); data/gplcver-2.12a/src/v_ex4.c:4196:24: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (np->nlds != NULL) strcat(s, " fo"); data/gplcver-2.12a/src/v_ex4.c:4197:22: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (np->n_hasdvars) strcat(s, " dumpvar"); data/gplcver-2.12a/src/v_ex4.c:4200:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(s, " evnts"); data/gplcver-2.12a/src/v_ex4.c:4201:18: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (np->n_gone) strcat(s, " disconnected"); data/gplcver-2.12a/src/v_ex4.c:4206:45: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (np->nu2.qcval[2*__inum].qc_active) strcat(s, " forced"); data/gplcver-2.12a/src/v_ex4.c:4207:54: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else if (np->nu2.qcval[2*__inum + 1].qc_active) strcat(s, " assigned"); data/gplcver-2.12a/src/v_ex4.c:4213:41: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (!vval_is0_(xsp->ap, np->nwid)) strcat(s, " forced"); data/gplcver-2.12a/src/v_ex4.c:4237:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ndxs[RECLEN]; data/gplcver-2.12a/src/v_ex4.c:4248:18: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (i1 == i2) sprintf(ndxs, " [%d]", __unmap_ndx(i1, ri1, ri2)); data/gplcver-2.12a/src/v_ex4.c:4249:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(ndxs, " [%d:%d]", __unmap_ndx(i1, ri1, ri2), data/gplcver-2.12a/src/v_ex4.c:4294:31: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (gp->g_class == GC_UDP) strcpy(__xs2, "udp"); data/gplcver-2.12a/src/v_ex4.c:4295:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(__xs2, "gate"); data/gplcver-2.12a/src/v_ex4.c:4568:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(__xs2, "$enddefinitions $end\n"); data/gplcver-2.12a/src/v_ex4.c:4712:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_ex4.c:4869:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(__xs2, "$upscope $end\n"); data/gplcver-2.12a/src/v_ex4.c:4946:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(__xs2, "$upscope $end\n"); data/gplcver-2.12a/src/v_ex4.c:5023:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(__xs2, "$upscope $end\n"); data/gplcver-2.12a/src/v_ex4.c:5035:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case Begin: strcpy(s, "begin"); break; data/gplcver-2.12a/src/v_ex4.c:5036:14: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case FORK: strcpy(s, "fork"); break; data/gplcver-2.12a/src/v_ex4.c:5037:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case FUNCTION: strcpy(s, "function"); break; data/gplcver-2.12a/src/v_ex4.c:5038:14: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TASK: strcpy(s, "task"); break; data/gplcver-2.12a/src/v_ex4.c:5073:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(__xs2, "$upscope $end\n"); data/gplcver-2.12a/src/v_ex4.c:5103:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(__xs2, "$upscope $end\n"); data/gplcver-2.12a/src/v_ex4.c:5120:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[15]; data/gplcver-2.12a/src/v_ex4.c:5310:26: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (t < WORDMASK_ULL) { sprintf(s, "%lu", t1a[0]); return(s); } data/gplcver-2.12a/src/v_ex4.c:5325:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s, "%llu", t); data/gplcver-2.12a/src/v_ex4.c:5548:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, &(np->nva.wp[2*itp->itinum]), sizeof(double)); data/gplcver-2.12a/src/v_ex4.c:5549:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(__xs2, "r%.16g ", d1); data/gplcver-2.12a/src/v_ex4.c:5627:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(__dv_buffer[__dv_nxti]), __exprline, __cur_sofs); data/gplcver-2.12a/src/v_fx.c:688:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fnam[IDLEN], stem[IDLEN]; data/gplcver-2.12a/src/v_fx.c:910:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *chp, savtoken[IDLEN]; data/gplcver-2.12a/src/v_fx.c:1107:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (is_dir) strcpy(__xs, " directory"); else strcpy(__xs, ""); data/gplcver-2.12a/src/v_fx.c:1246:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fnam[IDLEN], stem[IDLEN]; data/gplcver-2.12a/src/v_fx.c:1623:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_fx.c:1670:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (all_named) strcpy(s1, "all"); else strcpy(s1, "some"); data/gplcver-2.12a/src/v_fx.c:1670:45: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (all_named) strcpy(s1, "all"); else strcpy(s1, "some"); data/gplcver-2.12a/src/v_fx.c:2003:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[2*IDLEN]; data/gplcver-2.12a/src/v_fx.c:2150:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[2*IDLEN]; data/gplcver-2.12a/src/v_fx.c:2419:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_fx.c:2513:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_fx.c:3362:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(parm_np->nu2.wp, parm_np->nva.wp, nbytes); data/gplcver-2.12a/src/v_fx.c:3769:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_fx.c:3841:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(np->nva.wp, np->nu2.wp, 2*WRDBYTES*wlen_(np->nwid)); data/gplcver-2.12a/src/v_fx.c:3918:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(__wrkstab, mdp->msymtab->stsyms, data/gplcver-2.12a/src/v_fx.c:4115:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nsynam[2*IDLEN]; data/gplcver-2.12a/src/v_fx.c:4133:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nsynam[2*IDLEN]; data/gplcver-2.12a/src/v_fx.c:4170:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_fx.c:4176:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "[no ipxprtab]"); data/gplcver-2.12a/src/v_fx.c:4595:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_fx.c:4601:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "hierarchical reference instance array index (pos. %d)", data/gplcver-2.12a/src/v_fx.c:5566:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[IDLEN], s2[IDLEN], s3[IDLEN]; data/gplcver-2.12a/src/v_fx.c:5818:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ngrtab, oldgrtab, grnum*sizeof(struct gref_t)); data/gplcver-2.12a/src/v_fx.c:6192:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[IDLEN]; data/gplcver-2.12a/src/v_fx.c:6530:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nnptab, onptab, nbytes); data/gplcver-2.12a/src/v_fx.c:6577:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nnp->nva.wp, onp->nva.wp, nbytes); data/gplcver-2.12a/src/v_fx.c:7723:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *chp, s1[RECLEN]; data/gplcver-2.12a/src/v_fx.c:7728:28: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (itp->up_it == NULL) { strcpy(s1, "(top module)"); chp = s1; } data/gplcver-2.12a/src/v_fx2.c:1359:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_fx2.c:1455:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(np->nva.wp, xsp->ap, 2*owlen*WRDBYTES); data/gplcver-2.12a/src/v_fx2.c:1460:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(np->nva.wp, xsp->ap, 2*nwlen*WRDBYTES); data/gplcver-2.12a/src/v_fx2.c:1503:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, xsp->ap, 2*owlen*WRDBYTES); data/gplcver-2.12a/src/v_fx2.c:1561:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, xsp->ap, 2*owlen*WRDBYTES); data/gplcver-2.12a/src/v_fx2.c:1597:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, wp, sizeof(double)); data/gplcver-2.12a/src/v_fx2.c:1639:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_fx2.c:1700:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(np->nva.wp, xsp->ap, 2*WRDBYTES*wlen); data/gplcver-2.12a/src/v_fx2.c:1752:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_fx2.c:1763:54: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (xrhs->szu.xclen == WBITS && xrhs->has_sign) strcpy(s1, "integer"); data/gplcver-2.12a/src/v_fx2.c:1764:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s1, "%d bit register", xrhs->szu.xclen); data/gplcver-2.12a/src/v_fx2.c:1777:45: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (np->nwid == WBITS && np->n_signed) strcpy(s1, "integer"); data/gplcver-2.12a/src/v_fx2.c:1778:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s1, "%d bit register", np->nwid); data/gplcver-2.12a/src/v_fx2.c:1930:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, xsp->ap, 2*wlen*WRDBYTES); data/gplcver-2.12a/src/v_fx2.c:1968:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, xsp->ap, 2*wlen*WRDBYTES); data/gplcver-2.12a/src/v_fx2.c:2000:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, xsp->ap, 2*wlen*WRDBYTES); data/gplcver-2.12a/src/v_fx2.c:2074:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(np->nva.wp, xsp->ap, 2*wlen*WRDBYTES); data/gplcver-2.12a/src/v_fx2.c:2079:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, xsp->ap, 2*wlen*WRDBYTES); data/gplcver-2.12a/src/v_fx2.c:2171:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, xsp->ap, 2*wlen*WRDBYTES); data/gplcver-2.12a/src/v_fx2.c:2519:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_fx2.c:2971:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__timstr_unitsuf, " s"); data/gplcver-2.12a/src/v_fx2.c:2975:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__timstr_unitsuf, " ms"); data/gplcver-2.12a/src/v_fx2.c:2979:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__timstr_unitsuf, " ms"); data/gplcver-2.12a/src/v_fx2.c:2983:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__timstr_unitsuf, " ms"); data/gplcver-2.12a/src/v_fx2.c:2987:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__timstr_unitsuf, " us"); data/gplcver-2.12a/src/v_fx2.c:2991:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__timstr_unitsuf, " us"); data/gplcver-2.12a/src/v_fx2.c:2995:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__timstr_unitsuf, " us"); data/gplcver-2.12a/src/v_fx2.c:2999:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__timstr_unitsuf, " ns"); data/gplcver-2.12a/src/v_fx2.c:3003:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__timstr_unitsuf, " ns"); data/gplcver-2.12a/src/v_fx2.c:3007:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__timstr_unitsuf, " ns"); data/gplcver-2.12a/src/v_fx2.c:3011:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__timstr_unitsuf, " ps"); data/gplcver-2.12a/src/v_fx2.c:3015:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__timstr_unitsuf, " ps"); data/gplcver-2.12a/src/v_fx2.c:3019:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__timstr_unitsuf, " ps"); data/gplcver-2.12a/src/v_fx2.c:3023:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__timstr_unitsuf, " fs"); data/gplcver-2.12a/src/v_fx2.c:3027:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__timstr_unitsuf, " fs"); data/gplcver-2.12a/src/v_fx2.c:3031:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__timstr_unitsuf, " fs"); data/gplcver-2.12a/src/v_fx2.c:4431:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_fx2.c:4448:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_fx2.c:4900:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_fx2.c:4981:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_fx2.c:6182:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s2[20], s3[RECLEN]; data/gplcver-2.12a/src/v_fx2.c:6269:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char porthls[20], iphls[20]; data/gplcver-2.12a/src/v_fx2.c:6319:20: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. { porthl = TRUE; strcpy(porthls, "high to low"); } data/gplcver-2.12a/src/v_fx2.c:6320:25: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else { porthl = FALSE; strcpy(porthls, "low to high"); } data/gplcver-2.12a/src/v_fx2.c:6322:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. { iphl = TRUE; strcpy(iphls, "high to low"); } data/gplcver-2.12a/src/v_fx2.c:6323:23: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else { iphl = FALSE; strcpy(iphls, "low to high"); } data/gplcver-2.12a/src/v_fx2.c:6327:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[2*IDLEN], s2[20]; data/gplcver-2.12a/src/v_fx2.c:6884:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_fx2.c:6886:29: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (gp->g_class == GC_UDP) strcpy(s1, "udp"); else strcpy(s1, "gate"); data/gplcver-2.12a/src/v_fx2.c:6886:53: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (gp->g_class == GC_UDP) strcpy(s1, "udp"); else strcpy(s1, "gate"); data/gplcver-2.12a/src/v_fx2.c:7279:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_fx2.c:7345:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_fx2.c:8030:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, owp, 2*owlen*WRDBYTES); data/gplcver-2.12a/src/v_fx2.c:8574:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_fx2.c:8712:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_fx3.c:317:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char selnam[RECLEN], s1[RECLEN]; data/gplcver-2.12a/src/v_fx3.c:333:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (np->n_isarr) strcpy(selnam, "array"); data/gplcver-2.12a/src/v_fx3.c:334:25: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (np->n_isavec) strcpy(selnam, "bit"); data/gplcver-2.12a/src/v_fx3.c:556:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&(wp[2*wlen*ii]), wp2, 2*WRDBYTES*wlen); data/gplcver-2.12a/src/v_fx3.c:2460:12: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(__contab[ndp->ru.xvi]), np->nva.wp, 2*wsiz*WRDBYTES); data/gplcver-2.12a/src/v_fx3.c:2488:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dp, np->nva.dp, sizeof(double)*__inst_mod->flatinum); data/gplcver-2.12a/src/v_fx3.c:2494:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, np->nva.wp, sizeof(double)); data/gplcver-2.12a/src/v_fx3.c:2696:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_fx3.c:2749:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_fx3.c:2765:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(wp[2*wlen*__inum]), xsp->ap, 2*WRDBYTES*wlen); data/gplcver-2.12a/src/v_fx3.c:2943:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_fx3.c:3132:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_fx3.c:5792:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_fx3.c:5804:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s1, " terminal %d", num_peinels + 1); data/gplcver-2.12a/src/v_fx3.c:5811:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s1, " terminal %d", num_peoutels + 1); data/gplcver-2.12a/src/v_fx3.c:5898:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "path delay (element %d)", dnum + 1); data/gplcver-2.12a/src/v_fx3.c:5952:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_fx3.c:6014:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_fx3.c:6016:32: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (pthp->pthtyp == PTH_FULL) strcpy(s1, "*>"); else strcpy(s1, "=>"); data/gplcver-2.12a/src/v_fx3.c:6016:55: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (pthp->pthtyp == PTH_FULL) strcpy(s1, "*>"); else strcpy(s1, "=>"); data/gplcver-2.12a/src/v_fx3.c:6058:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_fx3.c:6343:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_ms.c:319:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(__acwrk, __lastacwrk, wlen*WRDBYTES); data/gplcver-2.12a/src/v_ms.c:321:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(__bcwrk, __lastbcwrk, wlen*WRDBYTES); data/gplcver-2.12a/src/v_ms.c:739:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *mactxt_chp, dnam[IDLEN]; data/gplcver-2.12a/src/v_ms.c:846:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dnam[IDLEN]; data/gplcver-2.12a/src/v_ms.c:1028:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char argnam[IDLEN]; data/gplcver-2.12a/src/v_ms.c:1245:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *startchp, *startid, idnam[IDLEN]; data/gplcver-2.12a/src/v_ms.c:1520:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *chp, incfnam[RECLEN], incpth[RECLEN]; data/gplcver-2.12a/src/v_ms.c:1882:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char __pv_ctab[128] = { data/gplcver-2.12a/src/v_ms.c:2489:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[IDLEN]; data/gplcver-2.12a/src/v_ms.c:2629:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(__lastacwrk, __acwrk, wlen*WRDBYTES); data/gplcver-2.12a/src/v_ms.c:2630:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(__lastbcwrk, __bcwrk, wlen*WRDBYTES); data/gplcver-2.12a/src/v_ms.c:2664:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nwidtoken[4*IDLEN]; data/gplcver-2.12a/src/v_ms.c:3041:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_ms.c:3066:32: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case BDEC: to_dec(&srcblen); strcpy(s1, "decimal"); break; data/gplcver-2.12a/src/v_ms.c:3067:29: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case BBIN: to_bin(chlen); strcpy(s1, "binary"); srcblen = chlen; break; data/gplcver-2.12a/src/v_ms.c:3068:29: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case BOCT: to_oct(chlen); strcpy(s1, "octal"); srcblen = 3*chlen; break; data/gplcver-2.12a/src/v_ms.c:3069:29: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case BHEX: to_hex(chlen); strcpy(s1, "hex"); srcblen = 4*chlen; break; data/gplcver-2.12a/src/v_ms.c:3230:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(__acwrk, acc, wlen*WRDBYTES); data/gplcver-2.12a/src/v_ms.c:3510:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_ms.c:3535:50: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (__run_state == SS_SIM && __cmd_s == NULL) strcpy(__token, "**EOL**"); data/gplcver-2.12a/src/v_ms.c:3536:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(__token, "**EOF**"); data/gplcver-2.12a/src/v_ms.c:3540:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case REALNUM: sprintf(__token, "%#g", __itok_realval); break; data/gplcver-2.12a/src/v_ms.c:3555:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case CAUSE: strcpy(__token, "->"); break; data/gplcver-2.12a/src/v_ms.c:3566:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case REDXNOR: strcpy(__token, "^~"); break; data/gplcver-2.12a/src/v_ms.c:3567:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case RELGE: strcpy(__token, ">="); break; data/gplcver-2.12a/src/v_ms.c:3569:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case RELLE: strcpy(__token, "<="); break; data/gplcver-2.12a/src/v_ms.c:3571:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case RELCEQ: strcpy(__token, "==="); break; data/gplcver-2.12a/src/v_ms.c:3572:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case RELEQ: strcpy(__token, "=="); break; data/gplcver-2.12a/src/v_ms.c:3573:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case RELCNEQ: strcpy(__token, "!=="); break; data/gplcver-2.12a/src/v_ms.c:3574:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case RELNEQ: strcpy(__token, "!="); break; data/gplcver-2.12a/src/v_ms.c:3575:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case BOOLAND: strcpy(__token, "&&"); break; data/gplcver-2.12a/src/v_ms.c:3576:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case BOOLOR: strcpy(__token, "||"); break; data/gplcver-2.12a/src/v_ms.c:3578:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case SHIFTL: strcpy(__token, "<<"); break; data/gplcver-2.12a/src/v_ms.c:3579:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case ASHIFTL: strcpy(__token, "<<<"); break; data/gplcver-2.12a/src/v_ms.c:3580:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case SHIFTR: strcpy(__token, ">>"); break; data/gplcver-2.12a/src/v_ms.c:3581:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case ASHIFTR: strcpy(__token, ">>>"); break; data/gplcver-2.12a/src/v_ms.c:3583:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case FPTHCON: strcpy(__token, "*>"); break; data/gplcver-2.12a/src/v_ms.c:3584:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case PPTHCON: strcpy(__token, "=>"); break; data/gplcver-2.12a/src/v_ms.c:3585:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TCHKEVAND: strcpy(__token, "&&&"); break; data/gplcver-2.12a/src/v_ms.c:3586:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case UNDEF: strcpy(__token, "**NONE**"); break; data/gplcver-2.12a/src/v_ms.c:3770:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s, "--none--"); data/gplcver-2.12a/src/v_ms.c:4230:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char __lbctab[128] = { data/gplcver-2.12a/src/v_ms.c:4290:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cfgctab[128] = { data/gplcver-2.12a/src/v_ms.c:4435:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case CFG_UNKNOWN: strcpy(s, "??CFG-UNKNOWN??"); break; data/gplcver-2.12a/src/v_ms.c:4439:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case CFG_EOF: strcpy(s, "**CFG EOF**"); break; data/gplcver-2.12a/src/v_ms.c:4440:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case CFG_LIBRARY: strcpy(s, "library"); break; data/gplcver-2.12a/src/v_ms.c:4441:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case CFG_CFG: strcpy(s, "config"); break; data/gplcver-2.12a/src/v_ms.c:4442:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case CFG_INCLUDE: strcpy(s, "include"); break; data/gplcver-2.12a/src/v_ms.c:4443:20: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case CFG_DESIGN: strcpy(s, "design"); break; data/gplcver-2.12a/src/v_ms.c:4444:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case CFG_LIBLIST: strcpy(s, "liblist"); break; data/gplcver-2.12a/src/v_ms.c:4445:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case CFG_INSTANCE: strcpy(s, "instance"); break; data/gplcver-2.12a/src/v_ms.c:4446:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case CFG_CELL: strcpy(s, "cell"); break; data/gplcver-2.12a/src/v_ms.c:4447:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case CFG_USE: strcpy(s, "use"); break; data/gplcver-2.12a/src/v_ms.c:4448:20: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case CFG_ENDCFG: strcpy(s, "endconfig"); break; data/gplcver-2.12a/src/v_ms.c:4449:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case CFG_DEFAULT: strcpy(s, "default"); break; data/gplcver-2.12a/src/v_ms.c:4938:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (chp == NULL) strcpy(s, "*unnamed*"); else strcpy(s, chp); data/gplcver-2.12a/src/v_ms.c:4988:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case N_WIRE: strcpy(s, "wire"); break; data/gplcver-2.12a/src/v_ms.c:4989:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case N_TRI: strcpy(s, "tri"); break; data/gplcver-2.12a/src/v_ms.c:4990:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case N_TRI0: strcpy(s, "tri0"); break; data/gplcver-2.12a/src/v_ms.c:4991:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case N_TRI1: strcpy(s, "tri1"); break; data/gplcver-2.12a/src/v_ms.c:4992:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case N_TRIOR: strcpy(s, "wor"); break; data/gplcver-2.12a/src/v_ms.c:4993:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case N_TRIAND: strcpy(s, "wand"); break; data/gplcver-2.12a/src/v_ms.c:4994:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case N_TRIREG: strcpy(s, "trireg"); break; data/gplcver-2.12a/src/v_ms.c:4995:14: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case N_WA: strcpy(s, "wand"); break; data/gplcver-2.12a/src/v_ms.c:4996:14: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case N_WO: strcpy(s, "wor"); break; data/gplcver-2.12a/src/v_ms.c:4997:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case N_SUPPLY0: strcpy(s, "supply0"); break; data/gplcver-2.12a/src/v_ms.c:4998:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case N_SUPPLY1: strcpy(s, "supply1"); break; data/gplcver-2.12a/src/v_ms.c:5000:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case N_REG: strcpy(s, "reg"); break; data/gplcver-2.12a/src/v_ms.c:5001:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case N_TIME: strcpy(s, "time"); break; data/gplcver-2.12a/src/v_ms.c:5002:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case N_INT: strcpy(s, "integer"); break; data/gplcver-2.12a/src/v_ms.c:5003:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case N_REAL: strcpy(s, "real"); break; data/gplcver-2.12a/src/v_ms.c:5004:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case N_EVENT: strcpy(s, "event"); break; data/gplcver-2.12a/src/v_ms.c:5016:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case IO_IN: strcpy(s, "input"); break; data/gplcver-2.12a/src/v_ms.c:5017:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case IO_OUT: strcpy(s, "output"); break; data/gplcver-2.12a/src/v_ms.c:5018:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case IO_BID: strcpy(s, "inout"); break; data/gplcver-2.12a/src/v_ms.c:5019:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case IO_UNKN: strcpy(s, "-unknown-"); break; data/gplcver-2.12a/src/v_ms.c:5020:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case NON_IO: strcpy(s, "-non-io-"); break; data/gplcver-2.12a/src/v_ms.c:5031:26: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (sptyp == SPLT_SCAL) strcpy(s, "scalared"); data/gplcver-2.12a/src/v_ms.c:5032:31: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (sptyp == SPLT_VECT) strcpy(s, "vectored"); data/gplcver-2.12a/src/v_ms.c:5062:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_ms.c:5079:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_ms.c:5095:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case ST_HIGHZ: strcpy(s, "highz"); break; data/gplcver-2.12a/src/v_ms.c:5096:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case ST_SMALL: strcpy(s, "small"); return(s); data/gplcver-2.12a/src/v_ms.c:5097:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case ST_MEDIUM: strcpy(s, "medium"); return(s); data/gplcver-2.12a/src/v_ms.c:5098:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case ST_WEAK: strcpy(s, "weak"); break; data/gplcver-2.12a/src/v_ms.c:5099:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case ST_LARGE: strcpy(s, "large"); return(s); data/gplcver-2.12a/src/v_ms.c:5100:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case ST_PULL: strcpy(s, "pull"); break; data/gplcver-2.12a/src/v_ms.c:5101:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case ST_STRONG: strcpy(s, "strong"); break; data/gplcver-2.12a/src/v_ms.c:5102:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case ST_SUPPLY: strcpy(s, "supply"); break; data/gplcver-2.12a/src/v_ms.c:5162:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case ST_HIGHZ: strcpy(s, "Hi"); break; data/gplcver-2.12a/src/v_ms.c:5163:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case ST_SMALL: strcpy(s, "Sm"); break; data/gplcver-2.12a/src/v_ms.c:5164:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case ST_MEDIUM: strcpy(s, "Me"); break; data/gplcver-2.12a/src/v_ms.c:5165:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case ST_WEAK: strcpy(s, "We"); break; data/gplcver-2.12a/src/v_ms.c:5166:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case ST_LARGE: strcpy(s, "La"); break; data/gplcver-2.12a/src/v_ms.c:5167:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case ST_PULL: strcpy(s, "Pu"); break; data/gplcver-2.12a/src/v_ms.c:5168:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case ST_STRONG: strcpy(s, "St"); break; data/gplcver-2.12a/src/v_ms.c:5169:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case ST_SUPPLY: strcpy(s, "Su"); break; data/gplcver-2.12a/src/v_ms.c:5181:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case SYM_UNKN: strcpy(s, "--unknown--"); break; data/gplcver-2.12a/src/v_ms.c:5182:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case SYM_I: strcpy(s, "instance"); break; data/gplcver-2.12a/src/v_ms.c:5183:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case SYM_M: strcpy(s, "module"); break; data/gplcver-2.12a/src/v_ms.c:5184:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case SYM_PRIM: strcpy(s, "primitive"); break; data/gplcver-2.12a/src/v_ms.c:5185:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case SYM_UDP: strcpy(s, "udp define"); break; data/gplcver-2.12a/src/v_ms.c:5186:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case SYM_N: strcpy(s, "variable"); break; data/gplcver-2.12a/src/v_ms.c:5187:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case SYM_TSK: strcpy(s, "task"); break; data/gplcver-2.12a/src/v_ms.c:5188:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case SYM_STSK: strcpy(s, "systask"); break; data/gplcver-2.12a/src/v_ms.c:5189:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case SYM_LB: strcpy(s, "named block"); break; data/gplcver-2.12a/src/v_ms.c:5190:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case SYM_F: strcpy(s, "function"); break; data/gplcver-2.12a/src/v_ms.c:5191:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case SYM_SF: strcpy(s, "sysfunction"); break; data/gplcver-2.12a/src/v_ms.c:5192:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case SYM_DEF: strcpy(s, "preprocessor `define"); break; data/gplcver-2.12a/src/v_ms.c:5193:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case SYM_CA: strcpy(s, "continuous assign"); break; data/gplcver-2.12a/src/v_ms.c:5194:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case SYM_PTH: strcpy(s, "delay path"); break; data/gplcver-2.12a/src/v_ms.c:5195:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case SYM_TCHK: strcpy(s, "timing check"); break; data/gplcver-2.12a/src/v_ms.c:5207:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case Begin: strcpy(s, "named begin"); break; data/gplcver-2.12a/src/v_ms.c:5208:14: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case FORK: strcpy(s, "named fork"); break; data/gplcver-2.12a/src/v_ms.c:5209:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case FUNCTION: strcpy(s, "function"); break; data/gplcver-2.12a/src/v_ms.c:5210:14: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TASK: strcpy(s, "task"); break; data/gplcver-2.12a/src/v_ms.c:5221:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_NULL: strcpy(s, "empty"); break; data/gplcver-2.12a/src/v_ms.c:5222:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_STNONE: strcpy(s, "empty block"); break; data/gplcver-2.12a/src/v_ms.c:5223:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_PROCA: strcpy(s, "proc. assign"); break; data/gplcver-2.12a/src/v_ms.c:5224:20: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_FORASSGN: strcpy(s, "for initial assign"); break; data/gplcver-2.12a/src/v_ms.c:5225:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_NBPROCA: strcpy(s, "non-blocking proc. assign"); break; data/gplcver-2.12a/src/v_ms.c:5226:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_RHSDEPROCA: strcpy(s, "proc. assign (rhs delay/event)"); break; data/gplcver-2.12a/src/v_ms.c:5227:14: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_IF: strcpy(s, "if"); break; data/gplcver-2.12a/src/v_ms.c:5228:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_CASE: strcpy(s, "case/casex/casez"); break; data/gplcver-2.12a/src/v_ms.c:5229:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_FOREVER: strcpy(s, "forever"); break; data/gplcver-2.12a/src/v_ms.c:5230:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_REPEAT: strcpy(s, "repeat"); break; data/gplcver-2.12a/src/v_ms.c:5231:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_WHILE: strcpy(s, "while"); break; data/gplcver-2.12a/src/v_ms.c:5232:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_WAIT: strcpy(s, "wait"); break; data/gplcver-2.12a/src/v_ms.c:5233:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_FOR : strcpy(s, "for loop"); break; data/gplcver-2.12a/src/v_ms.c:5234:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_DELCTRL: strcpy(s, "delay control"); break; data/gplcver-2.12a/src/v_ms.c:5235:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_NAMBLK : strcpy(s, "named block"); break; data/gplcver-2.12a/src/v_ms.c:5236:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_UNBLK : strcpy(s, "unnamed block"); break; data/gplcver-2.12a/src/v_ms.c:5237:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_UNFJ: strcpy(s, "parallel block"); break; data/gplcver-2.12a/src/v_ms.c:5238:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_TSKCALL: strcpy(s, "task enable"); break; data/gplcver-2.12a/src/v_ms.c:5239:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_QCONTA: strcpy(s, "quasi-continuous assign"); break; data/gplcver-2.12a/src/v_ms.c:5240:20: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_QCONTDEA: strcpy(s, "quasi-continous deassign"); break; data/gplcver-2.12a/src/v_ms.c:5241:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_CAUSE: strcpy(s, "cause"); break; data/gplcver-2.12a/src/v_ms.c:5242:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_DSABLE: strcpy(s, "disable"); break; data/gplcver-2.12a/src/v_ms.c:5243:20: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_REPSETUP: strcpy(s, "**added loop setup"); break; data/gplcver-2.12a/src/v_ms.c:5244:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_REPDCSETUP: strcpy(s, "**added repeat event control setup"); break; data/gplcver-2.12a/src/v_ms.c:5245:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case S_GOTO: strcpy(s, "**added goto"); break; data/gplcver-2.12a/src/v_ms.c:5257:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case FORCE: strcpy(s, "force"); break; data/gplcver-2.12a/src/v_ms.c:5258:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case RELEASE: strcpy(s, "release"); break; data/gplcver-2.12a/src/v_ms.c:5259:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case ASSIGN: strcpy(s, "assign"); break; data/gplcver-2.12a/src/v_ms.c:5260:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case DEASSIGN: strcpy(s, "deassign"); break; data/gplcver-2.12a/src/v_ms.c:5272:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TE_THRD: strcpy(s, "procedural"); break; data/gplcver-2.12a/src/v_ms.c:5273:14: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TE_G: strcpy(s, "gate assign"); break; data/gplcver-2.12a/src/v_ms.c:5274:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TE_CA: strcpy(s, "conta assign"); break; data/gplcver-2.12a/src/v_ms.c:5275:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TE_WIRE: strcpy(s, "wire delay"); break; data/gplcver-2.12a/src/v_ms.c:5276:20: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TE_BIDPATH: strcpy(s, "inout path dest."); break; data/gplcver-2.12a/src/v_ms.c:5277:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TE_MIPD_NCHG: strcpy(s, "MIPD change"); break; data/gplcver-2.12a/src/v_ms.c:5278:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TE_NBPA: strcpy(s, "NB assign"); break; data/gplcver-2.12a/src/v_ms.c:5279:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TE_TFSETDEL: strcpy(s, "tf_ set delay"); break; data/gplcver-2.12a/src/v_ms.c:5280:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TE_SYNC: strcpy(s, "tf_ #0 synchronize"); break; data/gplcver-2.12a/src/v_ms.c:5281:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TE_TFPUTPDEL: strcpy(s, "tf_ delayed strputp"); break; data/gplcver-2.12a/src/v_ms.c:5282:23: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TE_VPIPUTVDEL: strcpy(s, "vpi_ put value"); break; data/gplcver-2.12a/src/v_ms.c:5283:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TE_VPIDRVDEL: strcpy(s, "vpi_ add drv. chg."); break; data/gplcver-2.12a/src/v_ms.c:5284:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TE_VPICBDEL: strcpy(s, "vpi_ delay cb"); break; data/gplcver-2.12a/src/v_ms.c:5288:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s, "**UNKNOWN**"); data/gplcver-2.12a/src/v_ms.c:5299:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_ms.c:5302:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case NP_ICONN: strcpy(s, "instance port"); break; data/gplcver-2.12a/src/v_ms.c:5303:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case NP_PB_ICONN: strcpy(s, "instance per bit port"); break; data/gplcver-2.12a/src/v_ms.c:5304:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case NP_MDPRT: strcpy(s, "module port"); break; data/gplcver-2.12a/src/v_ms.c:5305:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case NP_PB_MDPRT: strcpy(s, "module per bit port"); break; data/gplcver-2.12a/src/v_ms.c:5306:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case NP_MIPD_NCHG: strcpy(s, "MIPD input/inout port"); break; data/gplcver-2.12a/src/v_ms.c:5308:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (npp->elnpp.ecap->ca_pb_sim) strcpy(s, "per bit cont. assign lvalue"); data/gplcver-2.12a/src/v_ms.c:5309:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s, "cont. assign lvalue"); break; data/gplcver-2.12a/src/v_ms.c:5311:20: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case NP_TFRWARG: strcpy(s, "tf_ PLI rw arg wire driver"); break; data/gplcver-2.12a/src/v_ms.c:5312:20: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case NP_VPIPUTV: strcpy(s, "vpi_put_value wire driver"); break; data/gplcver-2.12a/src/v_ms.c:5313:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case NP_GATE: strcpy(s, "gate terminal"); break; data/gplcver-2.12a/src/v_ms.c:5314:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case NP_TRANIF: strcpy(s, "tranif enable"); break; data/gplcver-2.12a/src/v_ms.c:5318:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case NP_PULL: strcpy(s, "pull driver"); break; data/gplcver-2.12a/src/v_ms.c:5330:23: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case NPCHG_TCSTART: strcpy(s, "tchk start ref."); break; data/gplcver-2.12a/src/v_ms.c:5331:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case NPCHG_TCCHK: strcpy(s, "tchk data end"); break; data/gplcver-2.12a/src/v_ms.c:5332:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case NPCHG_PTHSRC: strcpy(s, "path source"); break; data/gplcver-2.12a/src/v_ms.c:5344:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case DT_NONE: strcpy(s, "?none?"); break; data/gplcver-2.12a/src/v_ms.c:5345:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case DT_1V: strcpy(s, "one"); break; data/gplcver-2.12a/src/v_ms.c:5347:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s, "one instance specific"); data/gplcver-2.12a/src/v_ms.c:5349:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case DT_4V: strcpy(s, "(r, f, toz)"); break; data/gplcver-2.12a/src/v_ms.c:5351:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s, "(r, f, toz) instance specific"); data/gplcver-2.12a/src/v_ms.c:5353:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case DT_16V: strcpy(s, "path 2,3,6,12 value"); break; data/gplcver-2.12a/src/v_ms.c:5355:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s, "path 2,3,6,12 value instance specific"); data/gplcver-2.12a/src/v_ms.c:5357:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case DT_1X: strcpy(s, "one non constant"); break; data/gplcver-2.12a/src/v_ms.c:5358:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case DT_4X: strcpy(s, "(r, f, toz) non constant"); break; data/gplcver-2.12a/src/v_ms.c:5359:20: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case DT_PTHDST: strcpy(s, "internal path descriptor non"); break; data/gplcver-2.12a/src/v_ms.c:5360:20: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case DT_CMPLST: strcpy(s, "translation time expression list"); break; data/gplcver-2.12a/src/v_ms.c:5372:20: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TCHK_SETUP: strcpy(s, "$setup"); break; data/gplcver-2.12a/src/v_ms.c:5373:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TCHK_HOLD: strcpy(s, "$hold"); break; data/gplcver-2.12a/src/v_ms.c:5374:20: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TCHK_WIDTH: strcpy(s, "$width"); break; data/gplcver-2.12a/src/v_ms.c:5375:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TCHK_PERIOD: strcpy(s, "$period"); break; data/gplcver-2.12a/src/v_ms.c:5376:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TCHK_SKEW: strcpy(s, "$skew"); break; data/gplcver-2.12a/src/v_ms.c:5377:23: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TCHK_RECOVERY: strcpy(s, "$recovery"); break; data/gplcver-2.12a/src/v_ms.c:5378:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TCHK_SETUPHOLD: strcpy(s, "$setuphold"); break; data/gplcver-2.12a/src/v_ms.c:5379:23: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TCHK_NOCHANGE: strcpy(s, "$nochange"); break; data/gplcver-2.12a/src/v_ms.c:5381:23: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TCHK_FULLSKEW: strcpy(s, "$fullskew"); break; data/gplcver-2.12a/src/v_ms.c:5382:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TCHK_REMOVAL: strcpy(s, "$removal"); break; data/gplcver-2.12a/src/v_ms.c:5383:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TCHK_RECREM: strcpy(s, "$recrem"); break; data/gplcver-2.12a/src/v_ms.c:5384:23: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TCHK_TIMESKEW: strcpy(s, "$timeskew"); break; data/gplcver-2.12a/src/v_ms.c:5452:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (v == 0) strcpy(s, "*OFF*"); data/gplcver-2.12a/src/v_ms.c:5453:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (v == 1) strcpy(s, "*ON*"); data/gplcver-2.12a/src/v_ms.c:5454:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (v == 3) strcpy(s, "*UNKNOWN*"); data/gplcver-2.12a/src/v_ms.c:5523:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s, "HiZ"); data/gplcver-2.12a/src/v_ms.c:5602:11: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case 0: strcpy(s, "1 s"); break; data/gplcver-2.12a/src/v_ms.c:5603:11: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case 1: strcpy(s, "100 ms"); break; data/gplcver-2.12a/src/v_ms.c:5604:11: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case 2: strcpy(s, "10 ms"); break; data/gplcver-2.12a/src/v_ms.c:5605:11: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case 3: strcpy(s, "1 ms"); break; data/gplcver-2.12a/src/v_ms.c:5606:11: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case 4: strcpy(s, "100 us"); break; data/gplcver-2.12a/src/v_ms.c:5607:11: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case 5: strcpy(s, "10 us"); break; data/gplcver-2.12a/src/v_ms.c:5608:11: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case 6: strcpy(s, "1 us"); break; data/gplcver-2.12a/src/v_ms.c:5609:11: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case 7: strcpy(s, "100 ns"); break; data/gplcver-2.12a/src/v_ms.c:5610:11: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case 8: strcpy(s, "10 ns"); break; data/gplcver-2.12a/src/v_ms.c:5611:11: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case 9: strcpy(s, "1 ns"); break; data/gplcver-2.12a/src/v_ms.c:5612:12: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case 10: strcpy(s, "100 ps"); break; data/gplcver-2.12a/src/v_ms.c:5613:12: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case 11: strcpy(s, "10 ps"); break; data/gplcver-2.12a/src/v_ms.c:5614:12: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case 12: strcpy(s, "1 ps"); break; data/gplcver-2.12a/src/v_ms.c:5615:12: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case 13: strcpy(s, "100 fs"); break; data/gplcver-2.12a/src/v_ms.c:5616:12: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case 14: strcpy(s, "10 fs"); break; data/gplcver-2.12a/src/v_ms.c:5617:12: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case 15: strcpy(s, "1 fs"); break; data/gplcver-2.12a/src/v_ms.c:5633:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case E_POSEDGE: strcpy(s, "posedge"); break; data/gplcver-2.12a/src/v_ms.c:5634:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case E_NEGEDGE: strcpy(s, "negedge"); break; data/gplcver-2.12a/src/v_ms.c:5637:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s, "edge["); data/gplcver-2.12a/src/v_ms.c:5641:47: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (first_time) first_time = FALSE; else strcat(s, ", "); data/gplcver-2.12a/src/v_ms.c:5642:6: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(s, "01"); data/gplcver-2.12a/src/v_ms.c:5646:47: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (first_time) first_time = FALSE; else strcat(s, ", "); data/gplcver-2.12a/src/v_ms.c:5647:6: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(s, "10"); data/gplcver-2.12a/src/v_ms.c:5651:47: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (first_time) first_time = FALSE; else strcat(s, ", "); data/gplcver-2.12a/src/v_ms.c:5652:6: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(s, "0x"); data/gplcver-2.12a/src/v_ms.c:5656:47: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (first_time) first_time = FALSE; else strcat(s, ", "); data/gplcver-2.12a/src/v_ms.c:5657:6: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(s, "x1"); data/gplcver-2.12a/src/v_ms.c:5661:47: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (first_time) first_time = FALSE; else strcat(s, ", "); data/gplcver-2.12a/src/v_ms.c:5662:6: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(s, "1x"); data/gplcver-2.12a/src/v_ms.c:5666:47: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (first_time) first_time = FALSE; else strcat(s, ", "); data/gplcver-2.12a/src/v_ms.c:5667:6: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(s, "x0"); data/gplcver-2.12a/src/v_ms.c:5680:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case DC_NONE: strcpy(s, "**NONE?**"); break; data/gplcver-2.12a/src/v_ms.c:5681:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case DC_EVENT: strcpy(s,"event"); break; data/gplcver-2.12a/src/v_ms.c:5682:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case DC_DELAY: strcpy(s, "delay"); break; data/gplcver-2.12a/src/v_ms.c:5683:20: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case DC_RHSEVENT:strcpy(s,"rhs event"); break; data/gplcver-2.12a/src/v_ms.c:5684:20: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case DC_RHSDELAY:strcpy(s, "rhs delay"); break; data/gplcver-2.12a/src/v_ms.c:5685:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case DC_WAITEVENT: strcpy(s,"wait event"); break; data/gplcver-2.12a/src/v_ms.c:5865:29: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (*pthnam != '~') return(open(pthnam, opmask)); data/gplcver-2.12a/src/v_ms.c:5867:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(chp, opmask); data/gplcver-2.12a/src/v_ms.c:5899:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char usernam[RECLEN]; data/gplcver-2.12a/src/v_ms.c:5956:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((f = fopen(fnam, opmod)) == NULL) return(NULL); data/gplcver-2.12a/src/v_ms.c:6010:33: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else { strncpy(s1, s2, sendi); strcpy(&s1[sendi], "..."); } data/gplcver-2.12a/src/v_ms.c:6021:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_ms.c:6294:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpis1[IDLEN], vpis2[4*IDLEN], *vpichp; data/gplcver-2.12a/src/v_ms.c:6301:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(vpis1, "**FATAL ERROR** [%d] ", id_num); data/gplcver-2.12a/src/v_ms.c:6342:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpis1[IDLEN], vpis2[4*IDLEN], *vpichp; data/gplcver-2.12a/src/v_ms.c:6349:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(vpis1, "**FATAL ERROR** [%d] ", id_num); data/gplcver-2.12a/src/v_ms.c:6385:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpis1[IDLEN], vpis2[4*IDLEN], *vpichp; data/gplcver-2.12a/src/v_ms.c:6430:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpis1[IDLEN], vpis2[4*IDLEN], *vpichp; data/gplcver-2.12a/src/v_ms.c:6431:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_ms.c:6482:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpis1[IDLEN], vpis2[4*IDLEN], *vpichp; data/gplcver-2.12a/src/v_ms.c:6483:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_ms.c:6536:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpis1[IDLEN], vpis2[4*IDLEN], *vpichp; data/gplcver-2.12a/src/v_ms.c:6546:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(vpis1, "** ERROR** [%d] ", id_num); data/gplcver-2.12a/src/v_ms.c:6586:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpis1[IDLEN], vpis2[4*IDLEN], *vpichp; data/gplcver-2.12a/src/v_ms.c:6646:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpis1[IDLEN], vpis2[4*IDLEN], *vpichp; data/gplcver-2.12a/src/v_ms.c:6647:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_ms.c:6704:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpis1[IDLEN], vpis2[4*IDLEN], *vpichp; data/gplcver-2.12a/src/v_ms.c:6705:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_ms.c:6793:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpis1[IDLEN], vpis2[4*IDLEN], *vpichp; data/gplcver-2.12a/src/v_ms.c:6803:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(vpis1,"** WARN** [%d] ", id_num); data/gplcver-2.12a/src/v_ms.c:6838:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpis1[IDLEN], vpis2[4*IDLEN], *vpichp; data/gplcver-2.12a/src/v_ms.c:6894:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpis1[IDLEN], vpis2[4*IDLEN], *vpichp; data/gplcver-2.12a/src/v_ms.c:6895:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_ms.c:6949:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpis1[IDLEN], vpis2[4*IDLEN], *vpichp; data/gplcver-2.12a/src/v_ms.c:6950:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_ms.c:7035:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpis1[IDLEN], vpis2[4*IDLEN], *vpichp; data/gplcver-2.12a/src/v_ms.c:7045:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(vpis1, "--INFORM: [%d] ", id_num); data/gplcver-2.12a/src/v_ms.c:7080:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpis1[IDLEN], vpis2[4*IDLEN], *vpichp; data/gplcver-2.12a/src/v_ms.c:7126:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpis1[IDLEN], vpis2[4*IDLEN], *vpichp; data/gplcver-2.12a/src/v_ms.c:7127:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_ms.c:7180:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpis1[IDLEN], vpis2[4*IDLEN], *vpichp; data/gplcver-2.12a/src/v_ms.c:7181:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_prp.c:670:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_prp.c:736:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_prp.c:814:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_prp.c:839:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[10]; data/gplcver-2.12a/src/v_prp.c:856:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_prp.c:900:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vs1[10]; data/gplcver-2.12a/src/v_prp.c:952:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_prp.c:984:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_prp.c:1353:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nncomp, oncomp, sizeof(struct ncomp_t)); data/gplcver-2.12a/src/v_prp.c:1364:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nncomp, oncomp, sizeof(struct ncomp_t)); data/gplcver-2.12a/src/v_prp.c:1390:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nncomp, oncomp, sizeof(struct ncomp_t )); data/gplcver-2.12a/src/v_prp.c:1400:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nncomp, oncomp, sizeof(struct ncomp_t )); data/gplcver-2.12a/src/v_prp.c:1413:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nncomp, oncomp, sizeof(struct ncomp_t )); data/gplcver-2.12a/src/v_prp.c:1474:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN], s4[RECLEN]; data/gplcver-2.12a/src/v_prp.c:1482:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case Begin: strcpy(s2, "in begin block"); break; data/gplcver-2.12a/src/v_prp.c:1483:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case FORK: strcpy(s2, "in fork block"); break; data/gplcver-2.12a/src/v_prp.c:1484:20: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case FUNCTION: strcpy(s2, "in function"); break; data/gplcver-2.12a/src/v_prp.c:1485:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TASK: strcpy(s2, "in task"); break; data/gplcver-2.12a/src/v_prp.c:1493:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (np->n_isarr) strcpy(s2, "array"); else __to_wtnam(s2, np); data/gplcver-2.12a/src/v_prp.c:1498:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. { strcpy(s3, "unused"); infnum = 436; } data/gplcver-2.12a/src/v_prp.c:1500:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. { strcpy(s3, "caused but used in no event control"); infnum = 437; } data/gplcver-2.12a/src/v_prp.c:1501:11: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else { strcpy(s3, "used in event control but not caused"); infnum = 438; } data/gplcver-2.12a/src/v_prp.c:1505:44: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (!ncmp->n_onrhs && !ncmp->n_onlhs) { strcpy(s3, "unused"); data/gplcver-2.12a/src/v_prp.c:1508:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. { strcpy(s3, "set but not accessed"); infnum = 437; } data/gplcver-2.12a/src/v_prp.c:1509:11: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else { strcpy(s3, "accessed but not set"); infnum = 438; } data/gplcver-2.12a/src/v_prp2.c:373:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_prp2.c:551:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[IDLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_prp2.c:581:45: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (np->vec_scalared) strcpy(s2, ""); else strcpy(s2, " vectored"); data/gplcver-2.12a/src/v_prp2.c:699:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_prp2.c:1099:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_prp2.c:1167:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "per bit %d continuous assign", bi); data/gplcver-2.12a/src/v_prp2.c:1286:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_prp2.c:1297:31: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (deltyp == DBAD_NONE) { strcpy(s1, "no delay"); nd_inform = FALSE; } data/gplcver-2.12a/src/v_prp2.c:1299:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. { strcpy(s1, "possible 0 delay"); nd_inform = FALSE; } data/gplcver-2.12a/src/v_prp2.c:1301:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. { strcpy(s1, "all 0 delay"); nd_inform = FALSE; } data/gplcver-2.12a/src/v_prp2.c:1302:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "delay"); data/gplcver-2.12a/src/v_prp2.c:2517:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(np->nva.wp[2*i]), &d1, sizeof(double)); data/gplcver-2.12a/src/v_prp2.c:2523:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(np->nva.wp[2*i]), &d1, sizeof(double)); data/gplcver-2.12a/src/v_prp2.c:2816:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sbp3, sbp2, dcewid); data/gplcver-2.12a/src/v_prp2.c:2828:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sbp3, sbp2, dcewid); data/gplcver-2.12a/src/v_prp2.c:3011:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sbp, sbp2, dcewid); data/gplcver-2.12a/src/v_prp2.c:3096:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_prp2.c:3098:31: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (__processing_func) strcpy(s2, "called"); data/gplcver-2.12a/src/v_prp2.c:3099:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s2, "enabled"); data/gplcver-2.12a/src/v_prp2.c:3515:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_prp2.c:5781:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_prp2.c:5850:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s, "[%d]", bi); data/gplcver-2.12a/src/v_prp2.c:5863:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_prp2.c:6777:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_prp2.c:7185:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_prp2.c:7229:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[2*IDLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_prp2.c:7254:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s, "<EMPTY>"); data/gplcver-2.12a/src/v_prp2.c:7257:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s, "<EXPR END>"); data/gplcver-2.12a/src/v_sdf.c:156:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char __sdf_none_str[20]; data/gplcver-2.12a/src/v_sdf.c:157:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char __sdf_work_str[IDLEN]; data/gplcver-2.12a/src/v_sdf.c:158:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char __sdf_varnam[IDLEN]; data/gplcver-2.12a/src/v_sdf.c:169:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char __sdf_star_val[4]; /* special " * " string for all inst. star */ data/gplcver-2.12a/src/v_sdf.c:488:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:725:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:769:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:835:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__sdf_none_str, "[none]"); data/gplcver-2.12a/src/v_sdf.c:882:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__sdf_star_val, " * "); data/gplcver-2.12a/src/v_sdf.c:964:25: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (cntxt_itp == NULL) strcpy(cntxtnam, "**design**"); data/gplcver-2.12a/src/v_sdf.c:1176:25: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (mtmtyp == DEL_MIN) strcpy(s, "min"); data/gplcver-2.12a/src/v_sdf.c:1177:30: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (mtmtyp == DEL_TYP) strcpy(s, "typ"); data/gplcver-2.12a/src/v_sdf.c:1178:30: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (mtmtyp == DEL_MAX) strcpy(s, "max"); data/gplcver-2.12a/src/v_sdf.c:1179:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s, "-unknown-"); data/gplcver-2.12a/src/v_sdf.c:1283:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ctnam[IDLEN], inam[IDLEN], ginam[IDLEN], s1[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:1444:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s2[IDLEN]; data/gplcver-2.12a/src/v_sdf.c:1578:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errmsg, "root undefined"); data/gplcver-2.12a/src/v_sdf.c:1602:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errmsg, "no non-scope (probably gate) ending symbol"); data/gplcver-2.12a/src/v_sdf.c:1607:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errmsg, "non-scope symbol inside path"); data/gplcver-2.12a/src/v_sdf.c:1668:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errmsg, "path end must be instance"); data/gplcver-2.12a/src/v_sdf.c:1705:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ctgnam[IDLEN], s1[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:1871:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char formnam[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:1955:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[IDLEN]; data/gplcver-2.12a/src/v_sdf.c:2059:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:2088:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:2155:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:2171:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char formnam[RECLEN], pnam1[IDLEN], pnam2[IDLEN]; data/gplcver-2.12a/src/v_sdf.c:2488:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char portsrc[IDLEN], portdst[IDLEN]; data/gplcver-2.12a/src/v_sdf.c:2559:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:2562:23: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else if (si1 == si2) sprintf(s1, "[%d]", si1); data/gplcver-2.12a/src/v_sdf.c:2563:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s1, "[%d:%d]", si1, si2); data/gplcver-2.12a/src/v_sdf.c:2566:23: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else if (di1 == di2) sprintf(s2, "[%d]", di1); data/gplcver-2.12a/src/v_sdf.c:2567:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s2, "[%d:%d]", di1, di2); data/gplcver-2.12a/src/v_sdf.c:2592:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:2628:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:2657:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:2983:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char labnam[IDLEN]; data/gplcver-2.12a/src/v_sdf.c:3132:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &(__itok_realval), sizeof(double)); data/gplcver-2.12a/src/v_sdf.c:3185:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sdf_tcnam[RECLEN], s1[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:3349:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sdf_tcnam[RECLEN], s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:3352:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(sdf_tcnam, "SETUP matched to $setuphold"); data/gplcver-2.12a/src/v_sdf.c:3353:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(sdf_tcnam, "HOLD matched to $setuphold"); data/gplcver-2.12a/src/v_sdf.c:3368:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s2, "setup"); data/gplcver-2.12a/src/v_sdf.c:3374:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s2, "hold"); data/gplcver-2.12a/src/v_sdf.c:3431:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sdf_tcnam[RECLEN], s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:3434:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(sdf_tcnam, "RECOVERY matched to $recrem"); data/gplcver-2.12a/src/v_sdf.c:3435:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(sdf_tcnam, "REMOVAL matched to $recrem"); data/gplcver-2.12a/src/v_sdf.c:3450:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s2, "recovery"); data/gplcver-2.12a/src/v_sdf.c:3456:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s2, "removal"); data/gplcver-2.12a/src/v_sdf.c:3772:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:3801:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:3820:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pnam[IDLEN]; data/gplcver-2.12a/src/v_sdf.c:3875:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char labnam[IDLEN], nam[IDLEN]; data/gplcver-2.12a/src/v_sdf.c:4008:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:4211:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char qualport[IDLEN]; data/gplcver-2.12a/src/v_sdf.c:4278:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char port[IDLEN], s1[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:4381:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:4383:27: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (mpp->mpwide > 1) sprintf(s1, " bit %d", ndx); else strcpy(s1, ""); data/gplcver-2.12a/src/v_sdf.c:4400:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:4450:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:4633:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char portsrc[IDLEN], portdst[IDLEN]; data/gplcver-2.12a/src/v_sdf.c:4697:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sport[IDLEN], dport[RECLEN], s1[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:4834:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:4836:28: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (dmpp->mpwide > 1) sprintf(s1, " bit %d", ndx); else strcpy(s1, ""); data/gplcver-2.12a/src/v_sdf.c:4938:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char portdst[IDLEN]; data/gplcver-2.12a/src/v_sdf.c:5024:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char portnam[IDLEN]; data/gplcver-2.12a/src/v_sdf.c:5142:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tenam[RECLEN], constraint_name[IDLEN], pnam[IDLEN]; data/gplcver-2.12a/src/v_sdf.c:5341:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pnam[IDLEN]; data/gplcver-2.12a/src/v_sdf.c:5428:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char labnam[IDLEN], s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:5449:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (is_incr) strcpy(s1, "INCREMENT"); else strcpy(s1, "ABSOLUTE"); data/gplcver-2.12a/src/v_sdf.c:5449:51: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (is_incr) strcpy(s1, "INCREMENT"); else strcpy(s1, "ABSOLUTE"); data/gplcver-2.12a/src/v_sdf.c:5549:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, xsp->ap, 2*WRDBYTES*wlen); data/gplcver-2.12a/src/v_sdf.c:5575:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, xsp->ap, 2*WRDBYTES*wlen); data/gplcver-2.12a/src/v_sdf.c:5599:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, xsp->ap, 2*WRDBYTES*wlen); data/gplcver-2.12a/src/v_sdf.c:5640:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[IDLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:5745:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_sdf.c:5756:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:5761:30: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (np->nu.ct->p_specparam) strcpy(s1, "specparam"); data/gplcver-2.12a/src/v_sdf.c:5762:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "defparam"); data/gplcver-2.12a/src/v_sdf.c:5784:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_sdf.c:5785:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d2, xsp2->ap, sizeof(double)); data/gplcver-2.12a/src/v_sdf.c:5787:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d2, sizeof(double)); data/gplcver-2.12a/src/v_sdf.c:5866:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { memcpy(&(wp2[ii*wlen2x]), wp, WRDBYTES*wlen2x); } data/gplcver-2.12a/src/v_sdf.c:6425:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char sdf_ctab[128] = { data/gplcver-2.12a/src/v_sdf.c:6902:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[IDLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:6983:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[IDLEN], s2[IDLEN]; data/gplcver-2.12a/src/v_sdf.c:7047:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sdf.c:7201:14: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case TEOF: strcpy(__token, "**EOF**"); break; data/gplcver-2.12a/src/v_sdf.c:7204:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case NUMBER: sprintf(__token, "%d", __sdf_tokval); break; data/gplcver-2.12a/src/v_sdf.c:7205:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case REALNUM: sprintf(__token, "%#g", __itok_realval); break; data/gplcver-2.12a/src/v_sdf.c:7229:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case REDXNOR: strcpy(__token, "^~"); break; data/gplcver-2.12a/src/v_sdf.c:7230:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case BOOLAND: strcpy(__token, "&&"); break; data/gplcver-2.12a/src/v_sdf.c:7232:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case BOOLOR: strcpy(__token, "||"); break; data/gplcver-2.12a/src/v_sdf.c:7235:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case RELEQ: strcpy(__token, "=="); break; data/gplcver-2.12a/src/v_sdf.c:7236:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case RELCEQ: strcpy(__token, "==="); break; data/gplcver-2.12a/src/v_sdf.c:7238:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case RELNEQ: strcpy(__token, "!="); break; data/gplcver-2.12a/src/v_sdf.c:7239:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case RELCNEQ: strcpy(__token, "!=="); break; data/gplcver-2.12a/src/v_sdf.c:7240:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case RELGE: strcpy(__token, ">="); break; data/gplcver-2.12a/src/v_sdf.c:7241:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case SHIFTR: strcpy(__token, ">>"); break; data/gplcver-2.12a/src/v_sdf.c:7242:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case ASHIFTR: strcpy(__token, ">>>"); break; data/gplcver-2.12a/src/v_sdf.c:7244:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case RELLE: strcpy(__token, "<="); break; data/gplcver-2.12a/src/v_sdf.c:7245:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case SHIFTL: strcpy(__token, "<<"); break; data/gplcver-2.12a/src/v_sdf.c:7246:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case ASHIFTL: strcpy(__token, "<<<"); break; data/gplcver-2.12a/src/v_sdf.c:7248:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case UNDEF: strcpy(__token, "**NONE**"); break; data/gplcver-2.12a/src/v_sdf.c:7249:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case BADOBJ: strcpy(__token, "**ILLEGAL**"); break; data/gplcver-2.12a/src/v_sdf.c:7360:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s, "--none--"); data/gplcver-2.12a/src/v_sim.c:1198:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sim.c:1779:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_sim.c:2071:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vs1[10], vs2[10], vs3[10]; data/gplcver-2.12a/src/v_sim.c:2072:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sim.c:2234:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sim.c:2308:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[10], s4[10], s5[10]; data/gplcver-2.12a/src/v_sim.c:2313:25: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (__showe_onevent) strcpy(s1, " - edge event to x"); data/gplcver-2.12a/src/v_sim.c:2314:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, " - now detect to x"); data/gplcver-2.12a/src/v_sim.c:2417:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], vs1[10]; data/gplcver-2.12a/src/v_sim.c:2420:30: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (gp->gpins[0]->x_multfi) strcpy(s2, "this driver of multiple:"); data/gplcver-2.12a/src/v_sim.c:2421:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s2, "the fi=1 driver:"); data/gplcver-2.12a/src/v_sim.c:2755:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], vs1[10], vs2[10]; data/gplcver-2.12a/src/v_sim.c:2757:37: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (xp->lhsx_ndel && !__wire_init) strcpy(vs1, "schedule"); data/gplcver-2.12a/src/v_sim.c:2758:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(vs1, "assign"); data/gplcver-2.12a/src/v_sim.c:2759:29: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (gp->g_class == GC_UDP) strcpy(vs2, "udp"); else strcpy(vs2, "gate"); data/gplcver-2.12a/src/v_sim.c:2759:54: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (gp->g_class == GC_UDP) strcpy(vs2, "udp"); else strcpy(vs2, "gate"); data/gplcver-2.12a/src/v_sim.c:3197:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN], s4[RECLEN], s5[RECLEN]; data/gplcver-2.12a/src/v_sim.c:3408:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sim.c:3575:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sim.c:3578:25: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (np->n_isapthdst) strcpy(s2, " (path destination)"); data/gplcver-2.12a/src/v_sim.c:3644:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN], s4[RECLEN]; data/gplcver-2.12a/src/v_sim.c:3677:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_sim.c:3768:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sim.c:3789:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sim.c:3856:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_sim.c:4451:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dcesbp, nsbp, dcewid); data/gplcver-2.12a/src/v_sim.c:4503:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dcesbp, nsbp, dcewid); data/gplcver-2.12a/src/v_sim.c:4682:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sim.c:4723:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sim.c:4764:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sim.c:4802:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_sim.c:4806:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (pthifnone) strcpy(s, "CONDITION: ifnone)"); data/gplcver-2.12a/src/v_sim.c:4822:20: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (has_edge) strcat(s, ", and "); data/gplcver-2.12a/src/v_sim.c:4916:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_sim.c:5066:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_sim.c:5602:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_sim.c:5604:31: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (gp->g_class == GC_UDP) strcpy(s1, "udp"); else strcpy(s1, "gate"); data/gplcver-2.12a/src/v_sim.c:5604:55: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (gp->g_class == GC_UDP) strcpy(s1, "udp"); else strcpy(s1, "gate"); data/gplcver-2.12a/src/v_sim.c:5920:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_sim.c:5923:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, "assigned"); data/gplcver-2.12a/src/v_sim.c:6725:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. __my_free((char *) __btndstk[stki], sizeof(struct bt_t)); data/gplcver-2.12a/src/v_sim.c:6942:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_sim.c:7007:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_sim.c:7010:29: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (btp->bttyp == BTFRNGE) strcpy(s1, "fringe"); data/gplcver-2.12a/src/v_sim.c:7011:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "internal"); data/gplcver-2.12a/src/v_src.c:1196:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_src.c:1387:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char typnam[IDLEN]; data/gplcver-2.12a/src/v_src.c:1558:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_src.c:1783:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_src.c:1829:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s2[RECLEN]; data/gplcver-2.12a/src/v_src.c:2027:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_src.c:2055:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_src.c:2240:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_src.c:2447:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_src.c:2460:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (syp->sydecl) strcpy(s3, "declared"); else strcpy(s3, "used"); data/gplcver-2.12a/src/v_src.c:2460:50: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (syp->sydecl) strcpy(s3, "declared"); else strcpy(s3, "used"); data/gplcver-2.12a/src/v_src.c:2507:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_src.c:2734:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char paramnam[IDLEN], ptnam[RECLEN]; data/gplcver-2.12a/src/v_src.c:2736:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (is_local_param) strcpy(ptnam, "localparam"); data/gplcver-2.12a/src/v_src.c:2737:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(ptnam, "parameter"); data/gplcver-2.12a/src/v_src.c:3043:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, xsp->ap, 2*wlen*WRDBYTES); data/gplcver-2.12a/src/v_src.c:3051:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], *chp; data/gplcver-2.12a/src/v_src.c:3055:31: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (__root_ndp->is_real) strcpy(s1, "real "); data/gplcver-2.12a/src/v_src.c:3058:8: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s2, " width %d", __root_ndp->szu.xclen); data/gplcver-2.12a/src/v_src.c:3059:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (__root_ndp->is_string) strcpy(s1, "string "); data/gplcver-2.12a/src/v_src.c:3060:39: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (__root_ndp->has_sign) strcpy(s1, "signed "); data/gplcver-2.12a/src/v_src.c:3174:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ptnam[RECLEN], s1[RECLEN]; data/gplcver-2.12a/src/v_src.c:3176:32: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (__cur_declobj == SPECIFY) strcpy(ptnam, "specparam"); data/gplcver-2.12a/src/v_src.c:3177:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ptnam, "parameter"); data/gplcver-2.12a/src/v_src.c:3325:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_src.c:3441:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, xsp->ap, 2*wlen*WRDBYTES); data/gplcver-2.12a/src/v_src.c:3456:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "[%d:%d] cell real array", r1, r2); data/gplcver-2.12a/src/v_src.c:3458:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "[%d:%d] cell integer array", r1, r2); data/gplcver-2.12a/src/v_src.c:3461:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, " [%d:%d] cell %d bit reg array", r1, r2, np->nwid); data/gplcver-2.12a/src/v_src.c:3462:30: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (np->nu.ct->pstring) strcat(s1, " [string]"); data/gplcver-2.12a/src/v_src.c:3463:47: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else if (np->n_signed && pwtyp != N_INT) strcat(s1, " [signed]"); data/gplcver-2.12a/src/v_src.c:3488:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_src.c:3498:54: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (xrhs->szu.xclen == WBITS && xrhs->has_sign) strcpy(s1, "integer"); data/gplcver-2.12a/src/v_src.c:3499:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s1, "%d bit register", xrhs->szu.xclen); data/gplcver-2.12a/src/v_src.c:3512:45: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (np->nwid == WBITS && np->n_signed) strcpy(s1, "integer"); data/gplcver-2.12a/src/v_src.c:3513:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s1, "%d bit register", np->nwid); data/gplcver-2.12a/src/v_src.c:3702:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_src.c:3748:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], ptypnam[RECLEN]; data/gplcver-2.12a/src/v_src.c:3751:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. { is_spec = TRUE; strcpy(ptypnam, "specparam"); } data/gplcver-2.12a/src/v_src.c:3755:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (is_local_param) strcpy(ptypnam, "localparam"); data/gplcver-2.12a/src/v_src.c:3756:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(ptypnam, "parameter"); data/gplcver-2.12a/src/v_src.c:4462:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_src.c:4600:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_src.c:4852:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_src.c:5028:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_src.c:5331:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[IDLEN]; data/gplcver-2.12a/src/v_src.c:5358:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "__gate$$%d", __cp_num); data/gplcver-2.12a/src/v_src.c:5403:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "__gate$$%d", __cp_num); data/gplcver-2.12a/src/v_src.c:5727:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nam[IDLEN]; data/gplcver-2.12a/src/v_src.c:6131:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_src2.c:473:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__token, "**filler**"); data/gplcver-2.12a/src/v_src2.c:825:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_src2.c:1123:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_src2.c:1125:26: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (syp->sydecl) strcpy(s1, "declared"); else strcpy(s1, "used"); data/gplcver-2.12a/src/v_src2.c:1125:55: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (syp->sydecl) strcpy(s1, "declared"); else strcpy(s1, "used"); data/gplcver-2.12a/src/v_src2.c:1184:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_src2.c:1186:26: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (qcattyp == FORCE) strcpy(s1, "force"); data/gplcver-2.12a/src/v_src2.c:1187:32: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (qcattyp == ASSIGN) strcpy(s1, "quasi-continuous assign"); data/gplcver-2.12a/src/v_src2.c:1227:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_src2.c:1262:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[IDLEN]; data/gplcver-2.12a/src/v_src2.c:2688:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(rword), &(d1), sizeof(double)); data/gplcver-2.12a/src/v_src2.c:2725:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(__contab[wi]), ap, bytsiz); data/gplcver-2.12a/src/v_src2.c:2726:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(__contab[wi + wlen]), bp, bytsiz); data/gplcver-2.12a/src/v_src2.c:4188:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *chp, *gnam, s1[IDLEN]; data/gplcver-2.12a/src/v_src2.c:4430:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_src2.c:4935:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[2*IDLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_src2.c:4942:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. { strcpy(s, "**range**"); return(s); } data/gplcver-2.12a/src/v_src2.c:4962:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s, "<EMPTY>"); data/gplcver-2.12a/src/v_src2.c:4965:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s, "<EXPR END>"); data/gplcver-2.12a/src/v_src3.c:808:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uline[RECLEN], coduline[RECLEN], s1[RECLEN]; data/gplcver-2.12a/src/v_src3.c:910:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_src3.c:1291:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_src3.c:1360:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *chp, s1[RECLEN]; data/gplcver-2.12a/src/v_src3.c:1382:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, " (%c%c)", (char) utlp->utabsel, *chp); data/gplcver-2.12a/src/v_src3.c:1387:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else { sprintf(s1, "%5c", *chp); __wrap_puts(s1, f); } data/gplcver-2.12a/src/v_src3.c:1390:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. { sprintf(s1, " : %c ", *chp); __wrap_puts(s1, f); chp++; } data/gplcver-2.12a/src/v_src3.c:1391:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, " : %c ;", *chp); data/gplcver-2.12a/src/v_src3.c:1410:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_src3.c:1559:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char paramnam[IDLEN]; data/gplcver-2.12a/src/v_src3.c:1767:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, xsp->ap, 2*WRDBYTES*wlen); data/gplcver-2.12a/src/v_src3.c:1787:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, xsp->ap, 2*WRDBYTES); data/gplcver-2.12a/src/v_src3.c:1799:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, xsp->ap, 2*WRDBYTES*wlen); data/gplcver-2.12a/src/v_src3.c:2332:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_src3.c:2557:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_src3.c:2826:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_src3.c:2882:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_src3.c:3008:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_src3.c:3174:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__langstr, "`endlanguage"); data/gplcver-2.12a/src/v_src3.c:3182:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[IDLEN]; data/gplcver-2.12a/src/v_src3.c:3190:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__langstr, "`language"); data/gplcver-2.12a/src/v_src3.c:3355:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. __my_free((char *) __vinstk[vi], sizeof(struct vinstk_t)); data/gplcver-2.12a/src/v_src3.c:3396:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *attlin, attnam[IDLEN]; data/gplcver-2.12a/src/v_src3.c:3541:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_src3.c:3907:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char objnam[IDLEN], libnam[IDLEN], celnam[IDLEN]; data/gplcver-2.12a/src/v_src3.c:3908:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cfgnam[IDLEN], s1[IDLEN], s2[IDLEN]; data/gplcver-2.12a/src/v_src3.c:3917:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cfgnam, "**none**"); data/gplcver-2.12a/src/v_src3.c:4131:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rulp->inam_comptab, __bind_inam_comptab, nbytes); data/gplcver-2.12a/src/v_src3.c:4280:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[IDLEN], s2[IDLEN]; data/gplcver-2.12a/src/v_src3.c:4356:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[IDLEN], s2[IDLEN]; data/gplcver-2.12a/src/v_src3.c:4435:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[IDLEN], s2[IDLEN]; data/gplcver-2.12a/src/v_src3.c:4532:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[IDLEN], s2[IDLEN]; data/gplcver-2.12a/src/v_src3.c:4841:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[RECLEN]; data/gplcver-2.12a/src/v_src3.c:4936:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[RECLEN]; data/gplcver-2.12a/src/v_src3.c:4937:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[RECLEN]; data/gplcver-2.12a/src/v_src3.c:4938:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirstr[RECLEN]; data/gplcver-2.12a/src/v_src3.c:5005:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirstr[RECLEN]; data/gplcver-2.12a/src/v_src3.c:5006:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bpath[RECLEN]; data/gplcver-2.12a/src/v_src3.c:5007:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[RECLEN]; data/gplcver-2.12a/src/v_src3.c:5064:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[RECLEN]; data/gplcver-2.12a/src/v_src3.c:5224:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirstr[RECLEN]; data/gplcver-2.12a/src/v_src3.c:5225:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bpath[RECLEN]; data/gplcver-2.12a/src/v_src3.c:5272:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirstr[RECLEN]; data/gplcver-2.12a/src/v_src3.c:5273:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[RECLEN]; data/gplcver-2.12a/src/v_src3.c:5274:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[RECLEN]; data/gplcver-2.12a/src/v_src3.c:5284:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (path == NULL) { strcpy(str, "./"); cp = str; } data/gplcver-2.12a/src/v_src3.c:5485:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newlbp, lbep, sizeof(struct libel_t)); data/gplcver-2.12a/src/v_src3.c:5503:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[RECLEN]; data/gplcver-2.12a/src/v_src3.c:5504:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirstr[RECLEN]; data/gplcver-2.12a/src/v_src3.c:5609:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char typ[RECLEN]; data/gplcver-2.12a/src/v_src3.c:5641:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(typ, "Instance"); data/gplcver-2.12a/src/v_src3.c:5643:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(typ, "Cell"); data/gplcver-2.12a/src/v_src3.c:5837:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_src3.c:6066:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_src3.c:6075:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, "default"); data/gplcver-2.12a/src/v_src3.c:6100:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, "default"); data/gplcver-2.12a/src/v_src3.c:6296:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirstr[RECLEN]; data/gplcver-2.12a/src/v_src3.c:6471:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_tf.c:646:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &d1, nbytes); data/gplcver-2.12a/src/v_tf.c:986:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, __tfrec->tfargs[0].arg.awp, nbytes); data/gplcver-2.12a/src/v_tf.c:1229:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_tf.c:1456:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_tf.c:1610:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, wp, 2*wlen_(__tfrec->fretsiz)*WRDBYTES); data/gplcver-2.12a/src/v_tf.c:1691:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, wp, 2*wlen_(__tfrec->fretsiz)*WRDBYTES); data/gplcver-2.12a/src/v_tf.c:1712:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_tf.c:1789:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. { memcpy(&d1, wp, sizeof(double)); goto done; } data/gplcver-2.12a/src/v_tf.c:1790:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, wp, 2*wlen_(__tfrec->fretsiz)*WRDBYTES); data/gplcver-2.12a/src/v_tf.c:1801:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (xp->is_real) { memcpy(&d1, xsp->ap, sizeof(double)); goto done; } data/gplcver-2.12a/src/v_tf.c:1923:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, xsp->ap, 2*wlen_(__tfrec->fretsiz)*WRDBYTES); data/gplcver-2.12a/src/v_tf.c:2003:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tfap->arg.awp, &d1, sizeof(double)); data/gplcver-2.12a/src/v_tf.c:2014:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tfap->arg.awp, xsp->ap, 2*wlen_(__tfrec->fretsiz)*WRDBYTES); data/gplcver-2.12a/src/v_tf.c:2028:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_tf.c:2097:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tfap->arg.awp, &value, sizeof(double)); data/gplcver-2.12a/src/v_tf.c:2102:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tfap->arg.awp, xsp->ap, 2*wlen_(__tfrec->fretsiz)*WRDBYTES); data/gplcver-2.12a/src/v_tf.c:2113:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &value, sizeof(double)); data/gplcver-2.12a/src/v_tf.c:2433:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tedp->tedwp, xsp->ap, nbytes); data/gplcver-2.12a/src/v_tf.c:2550:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *chp, *chp2, s1[4]; data/gplcver-2.12a/src/v_tf.c:2863:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_tf.c:2865:39: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (tfap->anp->ntyp >= NONWIRE_ST) strcpy(s1, "procedural"); data/gplcver-2.12a/src/v_tf.c:2866:30: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (lhsxp->x_multfi) strcpy(s1, "continuous fi>1"); data/gplcver-2.12a/src/v_tf.c:2867:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "continuous fi=1"); data/gplcver-2.12a/src/v_tf.c:3604:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *chp, s1[RECLEN]; data/gplcver-2.12a/src/v_tf.c:3657:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *chp, s1[RECLEN]; data/gplcver-2.12a/src/v_tf.c:4256:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_tf.c:4290:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_tf.c:4329:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_tf.c:4558:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_tf.c:4649:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_tf.c:5246:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(tfap->tfdrv_wp.bp[__inum*lhslen]), sbp, lhslen); data/gplcver-2.12a/src/v_tf.c:5267:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[IDLEN]; data/gplcver-2.12a/src/v_tf.c:5270:37: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (tfap->anp->ntyp >= NONWIRE_ST) strcpy(s1, "procedural"); data/gplcver-2.12a/src/v_tf.c:5273:25: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (lhsxp->x_multfi) strcpy(s1, "continuous fi>1"); data/gplcver-2.12a/src/v_tf.c:5274:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "continuous fi=1"); data/gplcver-2.12a/src/v_trch.c:396:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_trch.c:420:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, "tran"); data/gplcver-2.12a/src/v_trch.c:427:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, "inout"); data/gplcver-2.12a/src/v_trch.c:2020:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sbp2, sbp, np->nwid); data/gplcver-2.12a/src/v_trch.c:2058:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_trch.c:2061:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. { strcpy(s1, " strength"); __st_regab_tostr(s2, sbp, np->nwid); } data/gplcver-2.12a/src/v_trch.c:2078:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_trch.c:2081:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. { strcpy(s1, " strength"); __st_regab_tostr(s2, sbp, np->nwid); } data/gplcver-2.12a/src/v_trch.c:2341:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], vs1[10], vs2[10], vs3[10]; data/gplcver-2.12a/src/v_trch.c:2354:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, " (pending event)"); data/gplcver-2.12a/src/v_trch.c:2733:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_trch.c:2737:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (np->n_stren) strcpy(s2, " strength"); else strcpy(s2, ""); data/gplcver-2.12a/src/v_trch.c:2748:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN], s4[RECLEN]; data/gplcver-2.12a/src/v_trch.c:2753:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, " strength"); data/gplcver-2.12a/src/v_trch.c:3090:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_trch.c:3092:31: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (conducting == 0) strcpy(s1, "*OFF*"); data/gplcver-2.12a/src/v_trch.c:3093:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (conducting == 1) strcpy(s1, "*ON*"); data/gplcver-2.12a/src/v_trch.c:3094:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "*UNKNOWN*"); data/gplcver-2.12a/src/v_trch.c:3270:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_trch.c:3385:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_trch.c:3412:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_trch.c:3437:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_trch.c:3439:25: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (conducting == 0) strcpy(s1, "*OFF*"); data/gplcver-2.12a/src/v_trch.c:3440:30: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (conducting == 1) strcpy(s1, "*ON*"); data/gplcver-2.12a/src/v_trch.c:3441:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "*UNKNOWN*"); data/gplcver-2.12a/src/v_trch.c:3719:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_trch.c:3736:50: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (!np->n_isavec) strcpy(s2, ""); else sprintf(s2, "[%d]", bi2); data/gplcver-2.12a/src/v_trch.c:3794:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_trch.c:3889:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_trch.c:3891:37: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (ei == -1) strcpy(s1, ""); else sprintf(s1, " %d:", ei); data/gplcver-2.12a/src/v_trch.c:3905:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (vp == NULL) strcpy(s, "*NONE*"); data/gplcver-2.12a/src/v_trch.c:3958:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN], s3[RECLEN]; data/gplcver-2.12a/src/v_trch.c:3968:39: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (ei == -1) strcpy(s1, ""); else sprintf(s1, " %d:", ei); data/gplcver-2.12a/src/v_trch.c:4398:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_trch.c:4480:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_trch.c:4488:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, " - no bits forced"); data/gplcver-2.12a/src/v_trch.c:4497:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s2[RECLEN]; data/gplcver-2.12a/src/v_trch.c:4526:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, " - some bits forced"); data/gplcver-2.12a/src/v_trch.c:4574:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s3[RECLEN]; data/gplcver-2.12a/src/v_trch.c:4648:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s3[RECLEN]; data/gplcver-2.12a/src/v_trch.c:4656:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__wrks1, " - not forced"); data/gplcver-2.12a/src/v_vpi.c:296:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], onam[RECLEN]; data/gplcver-2.12a/src/v_vpi.c:301:26: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (ldp->pli1_option) strcpy(onam, "+loadpli1="); data/gplcver-2.12a/src/v_vpi.c:302:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(onam, "+loadvpi="); data/gplcver-2.12a/src/v_vpi.c:1204:23: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbValueChange: strcpy(s, "cbValueChange"); break; data/gplcver-2.12a/src/v_vpi.c:1205:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbStmt: strcpy(s, "cbStmt"); break; data/gplcver-2.12a/src/v_vpi.c:1206:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbForce: strcpy(s, "cbForce"); break; data/gplcver-2.12a/src/v_vpi.c:1207:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbRelease: strcpy(s, "cbRelease"); break; data/gplcver-2.12a/src/v_vpi.c:1208:28: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbAtStartOfSimTime: strcpy(s, "cbAtStartOfSimTime"); break; data/gplcver-2.12a/src/v_vpi.c:1209:26: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbReadWriteSynch: strcpy(s, "cbReadWriteSynch"); break; data/gplcver-2.12a/src/v_vpi.c:1210:25: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbReadOnlySynch: strcpy(s, "cbReadOnlySynch"); break; data/gplcver-2.12a/src/v_vpi.c:1211:23: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbNextSimTime: strcpy(s, "cbNextSimTime"); break; data/gplcver-2.12a/src/v_vpi.c:1212:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbAfterDelay: strcpy(s, "cbAfterDelay"); break; data/gplcver-2.12a/src/v_vpi.c:1213:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbEndOfCompile: strcpy(s, "cbEndOfCompile"); break; data/gplcver-2.12a/src/v_vpi.c:1214:29: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbStartOfSimulation: strcpy(s, "cbStartOfSimulation"); break; data/gplcver-2.12a/src/v_vpi.c:1215:27: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbEndOfSimulation: strcpy(s, "cbEndOfSimulation"); break; data/gplcver-2.12a/src/v_vpi.c:1216:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbError: strcpy(s, "cbError"); break; data/gplcver-2.12a/src/v_vpi.c:1217:20: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbPLIError: strcpy(s, "cbPLIError"); break; data/gplcver-2.12a/src/v_vpi.c:1218:25: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbTchkViolation: strcpy(s, "cbTchkViolation"); break; data/gplcver-2.12a/src/v_vpi.c:1219:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbStartOfReset: strcpy(s, "cbStartOfReset"); break; data/gplcver-2.12a/src/v_vpi.c:1220:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbEndOfReset: strcpy(s, "cbEndOfReset"); break; data/gplcver-2.12a/src/v_vpi.c:1221:28: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbEnterInteractive: strcpy(s, "cbEnterInteractive"); break; data/gplcver-2.12a/src/v_vpi.c:1222:27: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbExitInteractive: strcpy(s, "cbExitInteractive"); break; data/gplcver-2.12a/src/v_vpi.c:1224:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s, "cbInteractiveScopeChange"); data/gplcver-2.12a/src/v_vpi.c:1226:27: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbUnresolvedSystf: strcpy(s, "cbUnresolvedSystf"); break; data/gplcver-2.12a/src/v_vpi.c:1227:23: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbStartOfSave: strcpy(s, "cbStartOfSave"); break; data/gplcver-2.12a/src/v_vpi.c:1228:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbEndOfSave: strcpy(s, "cbEndOfSave"); break; data/gplcver-2.12a/src/v_vpi.c:1229:26: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbStartOfRestart: strcpy(s, "cbStartOfRestart"); break; data/gplcver-2.12a/src/v_vpi.c:1230:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbEndOfRestart: strcpy(s, "cbEndOfRestart"); break; data/gplcver-2.12a/src/v_vpi.c:1231:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbLanguageLine: strcpy(s, "cbLanguageLine"); break; data/gplcver-2.12a/src/v_vpi.c:1234:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s, "**illegal**"); data/gplcver-2.12a/src/v_vpi.c:1763:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_vpi.c:1765:26: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (qctyp == cbForce) { strcpy(s1, "cbForce"); rftyp = DCE_CBF; } data/gplcver-2.12a/src/v_vpi.c:1766:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else { strcpy(s1, "cbRelease"); rftyp = DCE_CBR; } data/gplcver-2.12a/src/v_vpi.c:3307:23: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbValueChange: strcpy(s, "cbValueChange"); break; data/gplcver-2.12a/src/v_vpi.c:3308:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbStmt: strcpy(s, "cbStmt"); break; data/gplcver-2.12a/src/v_vpi.c:3309:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbForce: strcpy(s, "cbForce"); break; data/gplcver-2.12a/src/v_vpi.c:3310:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbRelease: strcpy(s, "cbRelease"); break; data/gplcver-2.12a/src/v_vpi.c:3311:28: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbAtStartOfSimTime: strcpy(s, "cbAtStartOfSimTime"); break; data/gplcver-2.12a/src/v_vpi.c:3312:26: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbReadWriteSynch: strcpy(s, "cbReadWriteSynch"); break; data/gplcver-2.12a/src/v_vpi.c:3313:25: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbReadOnlySynch: strcpy(s, "cbReadOnlySynch"); break; data/gplcver-2.12a/src/v_vpi.c:3314:23: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbNextSimTime: strcpy(s, "cbNextSimTime"); break; data/gplcver-2.12a/src/v_vpi.c:3315:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbAfterDelay: strcpy(s, "cbAfterDelay"); break; data/gplcver-2.12a/src/v_vpi.c:3316:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbEndOfCompile: strcpy(s, "cbEndOfCompile"); break; data/gplcver-2.12a/src/v_vpi.c:3317:29: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbStartOfSimulation: strcpy(s, "cbStartOfSimulation"); break; data/gplcver-2.12a/src/v_vpi.c:3318:27: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbEndOfSimulation: strcpy(s, "cbEndOfSimulation"); break; data/gplcver-2.12a/src/v_vpi.c:3319:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbError: strcpy(s, "cbError"); break; data/gplcver-2.12a/src/v_vpi.c:3320:25: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbTchkViolation: strcpy(s, "cbTchkViolation"); break; data/gplcver-2.12a/src/v_vpi.c:3321:23: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbStartOfSave: strcpy(s, "cbStartOfSave"); break; data/gplcver-2.12a/src/v_vpi.c:3322:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbEndOfSave: strcpy(s, "cbEndOfSave"); break; data/gplcver-2.12a/src/v_vpi.c:3323:26: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbStartOfRestart: strcpy(s, "cbStartOfRestart"); break; data/gplcver-2.12a/src/v_vpi.c:3324:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbEndOfRestart: strcpy(s, "cbEndOfRestart"); break; data/gplcver-2.12a/src/v_vpi.c:3325:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbStartOfReset: strcpy(s, "cbStartOfReset"); break; data/gplcver-2.12a/src/v_vpi.c:3326:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbEndOfReset: strcpy(s, "cbEndOfReset"); break; data/gplcver-2.12a/src/v_vpi.c:3327:28: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbEnterInteractive: strcpy(s, "cbEnterInteractive"); break; data/gplcver-2.12a/src/v_vpi.c:3328:27: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbExitInteractive: strcpy(s, "cbExitInteractive"); break; data/gplcver-2.12a/src/v_vpi.c:3329:34: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbInteractiveScopeChange: strcpy(s, "cbInteractiveScopeChange"); break; data/gplcver-2.12a/src/v_vpi.c:3330:27: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbUnresolvedSystf: strcpy(s, "cbUnresolvedSystf"); break; data/gplcver-2.12a/src/v_vpi.c:3331:12: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. default: strcpy(s, "**none**"); data/gplcver-2.12a/src/v_vpi.c:4282:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__wrks2, "*none*"); data/gplcver-2.12a/src/v_vpi.c:4338:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. { strcpy(__wrks2, "variable vpiVarSelect"); goto no_iconnbit; } data/gplcver-2.12a/src/v_vpi.c:4349:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. { strcpy(__wrks2, "x/z vpiVarSelect"); goto no_iconnbit; } data/gplcver-2.12a/src/v_vpi.c:4482:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_vpi.c:5191:20: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (hp == NULL) strcpy(__wrks2, "**NULL**"); data/gplcver-2.12a/src/v_vpi2.c:1352:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->scanhtab, __ithtab, nterms*sizeof(struct h_t)); data/gplcver-2.12a/src/v_vpi2.c:1353:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->ihrectab, __ithrectab, nterms*sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:1570:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->scanhtab, __ithtab, nterms*sizeof(struct h_t)); data/gplcver-2.12a/src/v_vpi2.c:1571:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->ihrectab, __ithrectab, nterms*sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:1665:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hrp2, &tmphrec, sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:1749:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->scanhtab, __ithtab, ndels*sizeof(struct h_t)); data/gplcver-2.12a/src/v_vpi2.c:1750:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->ihrectab, __ithrectab, ndels*sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:1785:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hp2, &(tmph), sizeof(struct h_t)); data/gplcver-2.12a/src/v_vpi2.c:1787:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hrp2, &(tmphrec), sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:1799:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hp2, &(tmph), sizeof(struct h_t)); data/gplcver-2.12a/src/v_vpi2.c:1801:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hrp2, &(tmphrec), sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:1809:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hp2, &(tmph), sizeof(struct h_t)); data/gplcver-2.12a/src/v_vpi2.c:1811:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hrp2, &(tmphrec), sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:1820:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hp2, &(tmph), sizeof(struct h_t)); data/gplcver-2.12a/src/v_vpi2.c:1822:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hrp2, &(tmphrec), sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:2107:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__wrks2, "*none*"); data/gplcver-2.12a/src/v_vpi2.c:2246:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->scanhtab, __ithtab, numprts*sizeof(struct h_t)); data/gplcver-2.12a/src/v_vpi2.c:2247:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->ihrectab, __ithrectab, numprts*sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:2419:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->scanhtab, __ithtab, numprts*sizeof(struct h_t)); data/gplcver-2.12a/src/v_vpi2.c:2420:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->ihrectab, __ithrectab, numprts*sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:2520:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_vpi2.c:2587:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_vpi2.c:2684:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->scanhtab, __ithtab, numprts*sizeof(struct h_t)); data/gplcver-2.12a/src/v_vpi2.c:2685:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->ihrectab, __ithrectab, numprts*sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:2948:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->scanhtab, __ithtab, numprts*sizeof(struct h_t)); data/gplcver-2.12a/src/v_vpi2.c:2949:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->ihrectab, __ithrectab, numprts*sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:3253:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->scanhtab, __ithtab, num*sizeof(struct h_t)); data/gplcver-2.12a/src/v_vpi2.c:3254:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->ihrectab, __ithrectab, num*sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:3312:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hrp2, &tmphrec, sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:3356:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hrp2, &tmphrec, sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:3443:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->scanhtab, __ithtab, num*sizeof(struct h_t)); data/gplcver-2.12a/src/v_vpi2.c:3444:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->ihrectab, __ithrectab, num*sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:3517:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hrp2, &tmphrec, sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:3579:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hrp2, &tmphrec, sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:3785:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(__ithtab2[xlnum]), __ithtab, num*sizeof(struct h_t)); data/gplcver-2.12a/src/v_vpi2.c:3786:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(__ithrectab2[xlnum]), __ithrectab, num*sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:3801:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->scanhtab, __ithtab2, xlnum*sizeof(struct h_t)); data/gplcver-2.12a/src/v_vpi2.c:3802:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->ihrectab, __ithrectab2, xlnum*sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:3868:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->scanhtab, __ithtab, num*sizeof(struct h_t)); data/gplcver-2.12a/src/v_vpi2.c:3869:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->ihrectab, __ithrectab, num*sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:3919:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hrp2, &tmphrec, sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:3964:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hrp2, &tmphrec, sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:4007:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hrp2, &tmphrec, sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:4108:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->scanhtab, __ithtab, num*sizeof(struct h_t)); data/gplcver-2.12a/src/v_vpi2.c:4109:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iterp->ihrectab, __ithrectab, num*sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:4176:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hrp2, &tmphrec, sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:4239:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hrp2, &tmphrec, sizeof(struct hrec_t)); data/gplcver-2.12a/src/v_vpi2.c:6424:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_vpi2.c:6798:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__wrk_vpiget_str, "[Unknown]"); data/gplcver-2.12a/src/v_vpi3.c:1855:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_vpi3.c:1874:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**none called**"); data/gplcver-2.12a/src/v_vpi3.c:2052:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sbp, sbp2, np->nwid); data/gplcver-2.12a/src/v_vpi3.c:2601:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&d1, xsp->ap, sizeof(double)); data/gplcver-2.12a/src/v_vpi3.c:2675:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *chp, s1[RECLEN]; data/gplcver-2.12a/src/v_vpi3.c:2686:47: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (utlp->utabsel == '0' && *chp == '1') strcat(s, " r"); data/gplcver-2.12a/src/v_vpi3.c:2687:52: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else if (utlp->utabsel == '1' && *chp == '0') strcat(s, " f"); data/gplcver-2.12a/src/v_vpi3.c:2688:37: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else if (utlp->utabsel == '*') strcat(s, " *"); data/gplcver-2.12a/src/v_vpi3.c:2689:37: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else if (utlp->utabsel == 'p') strcat(s, " p"); data/gplcver-2.12a/src/v_vpi3.c:2690:37: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else if (utlp->utabsel == 'n') strcat(s, " n"); data/gplcver-2.12a/src/v_vpi3.c:2693:8: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, " (%c%c)", (char) utlp->utabsel, *chp); data/gplcver-2.12a/src/v_vpi3.c:2698:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else { sprintf(s1, "%5c", *chp); strcat(s, s1); } data/gplcver-2.12a/src/v_vpi3.c:2701:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. { sprintf(s1, " : %c ", *chp); strcat(s, s1); chp++; } data/gplcver-2.12a/src/v_vpi3.c:2702:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, " : %c ;", *chp); data/gplcver-2.12a/src/v_vpi3.c:2968:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_vpi3.c:3128:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiAddDriver: strcpy(s, "vpiAddDriver"); break; data/gplcver-2.12a/src/v_vpi3.c:3129:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiCancelEvent: strcpy(s, "vpiCancelEvent"); break; data/gplcver-2.12a/src/v_vpi3.c:3130:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiForceFlag: strcpy(s, "vpiForceFlag"); break; data/gplcver-2.12a/src/v_vpi3.c:3131:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiReleaseFlag: strcpy(s, "vpiReleaseFlag"); break; data/gplcver-2.12a/src/v_vpi3.c:3132:20: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiNoDelay: strcpy(s, "vpiNoDelay"); break; data/gplcver-2.12a/src/v_vpi3.c:3133:26: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiInertialDelay: strcpy(s, "vpiInertial"); break; data/gplcver-2.12a/src/v_vpi3.c:3134:27: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiTransportDelay: strcpy(s, "vpiTransportDelay"); break; data/gplcver-2.12a/src/v_vpi3.c:3135:31: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiPureTransportDelay: strcpy(s, "vpiPureTransportDelay"); break; data/gplcver-2.12a/src/v_vpi3.c:3136:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. default: sprintf(s, "unknown (%lu)", dtyp); data/gplcver-2.12a/src/v_vpi3.c:3170:43: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (value_p->format == vpiSuppressVal) strcpy(__wrks1, "vpiSuppressVal"); data/gplcver-2.12a/src/v_vpi3.c:3171:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(__wrks1, "vpiObjTypeVal"); data/gplcver-2.12a/src/v_vpi3.c:3438:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_vpi3.c:3576:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_vpi3.c:3941:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sbp2, sbp, lhslen); data/gplcver-2.12a/src/v_vpi3.c:4042:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__wrks1, "vpiBinStrVal"); data/gplcver-2.12a/src/v_vpi3.c:4058:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_vpi3.c:4064:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__wrks1, "vpiOctStrVal"); data/gplcver-2.12a/src/v_vpi3.c:4068:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__wrks1, "vpiDecStrVal"); data/gplcver-2.12a/src/v_vpi3.c:4073:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__wrks1, "vpiHexStrVal"); data/gplcver-2.12a/src/v_vpi3.c:4097:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_vpi3.c:4112:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_vpi3.c:4144:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_vpi3.c:4205:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(xsp->ap, &d1, sizeof(double)); data/gplcver-2.12a/src/v_vpi3.c:4256:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s3[RECLEN], s4[RECLEN]; data/gplcver-2.12a/src/v_vpi3.c:4276:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(__wrks1, " replace force"); data/gplcver-2.12a/src/v_vpi3.c:4283:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(__wrks1, " override assign"); data/gplcver-2.12a/src/v_vpi3.c:4314:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s3[RECLEN]; data/gplcver-2.12a/src/v_vpi3.c:4340:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__wrks1, " reactivating assign"); data/gplcver-2.12a/src/v_vpi3.c:4364:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s3[RECLEN]; data/gplcver-2.12a/src/v_vpi3.c:4442:47: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (lhsbi == -1) strcpy(__wrks1, ""); else sprintf(__wrks1, "[%d]", lhsbi); data/gplcver-2.12a/src/v_vpi3.c:4480:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s3[RECLEN]; data/gplcver-2.12a/src/v_vpi3.c:4484:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__wrks1, " - no bits ever forced"); data/gplcver-2.12a/src/v_vpi3.c:4519:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__wrks1, " - no bits currently forced"); data/gplcver-2.12a/src/v_vpi3.c:4525:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. { strcpy(__wrks1, " - some bits forced"); goto no_force; } data/gplcver-2.12a/src/v_vpi3.c:4549:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_vpi3.c:4564:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**none called**"); data/gplcver-2.12a/src/v_vpi3.c:4627:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, xsp->ap, 2*WRDBYTES*wlen); data/gplcver-2.12a/src/v_vpi3.c:4847:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ts1[RECLEN], ts2[IDLEN], ts3[RECLEN], ts4[RECLEN]; data/gplcver-2.12a/src/v_vpi3.c:4868:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ts1, "procedural"); data/gplcver-2.12a/src/v_vpi3.c:4875:20: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (np->ntraux) strcpy(ts1, "vpi_ inout or tran channel driver"); data/gplcver-2.12a/src/v_vpi3.c:4876:27: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (np->n_multfi) strcpy(ts1, "vpi_ wire driver"); data/gplcver-2.12a/src/v_vpi3.c:4879:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(ts1, "wire"); data/gplcver-2.12a/src/v_vpi3.c:5123:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_vpi3.c:5126:32: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (np->ntyp >= NONWIRE_ST) strcpy(s1, "reg"); data/gplcver-2.12a/src/v_vpi3.c:5127:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "wire soft force"); data/gplcver-2.12a/src/v_vpi3.c:5216:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tepvp->putv_wp, xsp->ap, 2*WRDBYTES*wlen); data/gplcver-2.12a/src/v_vpi3.c:5275:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ts1[RECLEN], ts2[RECLEN], ts3[RECLEN]; data/gplcver-2.12a/src/v_vpi3.c:5554:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ts1[RECLEN]; data/gplcver-2.12a/src/v_vpi3.c:5556:22: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (np->n_isavec) sprintf(ts1, "bit %d driver", bi); data/gplcver-2.12a/src/v_vpi3.c:5557:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(ts1, "scalar driver"); data/gplcver-2.12a/src/v_vpi3.c:5652:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tepvp->putv_wp, xsp->ap, 1); data/gplcver-2.12a/src/v_vpi3.c:5886:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[RDBUFSIZ]; data/gplcver-2.12a/src/v_vpi3.c:5906:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[RDBUFSIZ]; data/gplcver-2.12a/src/v_vpi3.c:6498:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_vpi3.c:6500:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (turn_cb_on) strcpy(s1, "vpiEnableCb"); else strcpy(s1, "vpiDisableCb"); data/gplcver-2.12a/src/v_vpi3.c:6500:50: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (turn_cb_on) strcpy(s1, "vpiEnableCb"); else strcpy(s1, "vpiDisableCb"); data/gplcver-2.12a/src/v_vpi3.c:6625:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[RECLEN]; data/gplcver-2.12a/src/v_vpi3.c:6650:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *chp, s1[RECLEN], s2[RECLEN]; data/gplcver-2.12a/src/v_vpi3.c:6738:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s2, " ["); data/gplcver-2.12a/src/v_vpi3.c:6742:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "index=%d", hrp->hi); data/gplcver-2.12a/src/v_vpi3.c:6748:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (!first_time) strcat(s2, ", "); else first_time = FALSE; data/gplcver-2.12a/src/v_vpi3.c:6749:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(s2, "in interator"); data/gplcver-2.12a/src/v_vpi3.c:6753:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (!first_time) strcat(s2, ", "); else first_time = FALSE; data/gplcver-2.12a/src/v_vpi3.c:6754:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(s2, "Created object"); data/gplcver-2.12a/src/v_vpi3.c:6758:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (!first_time) strcat(s2, ", "); else first_time = FALSE; data/gplcver-2.12a/src/v_vpi3.c:6759:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "Schedule event done=%d", hrp->evnt_done); data/gplcver-2.12a/src/v_vpi3.c:6764:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (!first_time) strcat(s2, ", "); else first_time = FALSE; data/gplcver-2.12a/src/v_vpi3.c:6765:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(s2, "Variable index"); data/gplcver-2.12a/src/v_vpi3.c:7010:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s, "**out of range (%lu)", vpioval); data/gplcver-2.12a/src/v_vpi3.c:7123:30: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (pval == vpiUndefined) { strcpy(s, "vpiUndefined"); return(s); } data/gplcver-2.12a/src/v_vpi3.c:7130:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s, "**property out of range (%d)", pval); data/gplcver-2.12a/src/v_vpi3.c:7186:31: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (opval == vpiUndefined) { strcpy(s, "vpiUndefined"); return(s); } data/gplcver-2.12a/src/v_vpi3.c:7188:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. { sprintf(s, "**operator out of range (%d)", opval); return(s); } data/gplcver-2.12a/src/v_vpi3.c:7199:31: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (opval == vpiUndefined) { strcpy(s, "<UNDEF>"); return(s); } data/gplcver-2.12a/src/v_vpi3.c:7201:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. { sprintf(s, "**operator out of range (%d)", opval); return(s); } data/gplcver-2.12a/src/v_vpi3.c:7260:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__wrks1, "** NULL OR LOW NUMBER **"); data/gplcver-2.12a/src/v_vpi3.c:7267:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(__wrks1, "** PTR INTO DATA BASE ILLEGAL **"); data/gplcver-2.12a/src/v_vpi3.c:7272:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(__wrks1, "%d", hrp->htyp); data/gplcver-2.12a/src/v_vpi3.c:7391:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(__wrk_vpi_errcode, "%d", ernum); data/gplcver-2.12a/src/v_vpi3.c:7428:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(__wrk_vpi_errcode, "%d", ernum); data/gplcver-2.12a/tests_and_examples/examples.acc/acc_probe.c:17:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char value_ar[10][MAXSIZE][17]; data/gplcver-2.12a/tests_and_examples/examples.acc/acc_probe.c:124:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[1024]; data/gplcver-2.12a/tests_and_examples/examples.acc/acc_prtchg.c:146:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[1024]; data/gplcver-2.12a/tests_and_examples/examples.acc/acc_prtchg.c:152:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**terminal**"); data/gplcver-2.12a/tests_and_examples/examples.acc/acc_prtchg.c:172:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[1024], s2[1024], s3[1024]; data/gplcver-2.12a/tests_and_examples/examples.acc/acc_prtchg.c:189:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "<%d, %d>=%d", (int) vcp->out_value.strengths_s.strength1, data/gplcver-2.12a/tests_and_examples/examples.acc/acc_prtchg.c:208:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s3, "**terminal**"); data/gplcver-2.12a/tests_and_examples/examples.acc/acc_prtchg.c:223:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[1024], s2[1024], s3[1024]; data/gplcver-2.12a/tests_and_examples/examples.acc/acc_prtchg.c:258:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s2, "**error**"); data/gplcver-2.12a/tests_and_examples/examples.acc/acc_prtchg.c:261:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s2, "**event**"); data/gplcver-2.12a/tests_and_examples/examples.acc/acc_prtchg.c:272:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s3, "**terminal**"); data/gplcver-2.12a/tests_and_examples/examples.acc/accxl_drvld.c:77:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[1024], s2[1024]; data/gplcver-2.12a/tests_and_examples/examples.acc/accxl_drvld.c:83:41: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (mei_isinside(inst, term) == 1) { strcpy(s1, "inside"); count++; } data/gplcver-2.12a/tests_and_examples/examples.acc/accxl_drvld.c:84:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "outside"); data/gplcver-2.12a/tests_and_examples/examples.acc/accxl_drvld.c:121:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[1024], s2[1024]; data/gplcver-2.12a/tests_and_examples/examples.acc/accxl_drvld.c:127:41: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (mei_isinside(inst, term) == 0) { strcpy(s1, "outside"); count++; } data/gplcver-2.12a/tests_and_examples/examples.acc/accxl_drvld.c:128:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "inside"); data/gplcver-2.12a/tests_and_examples/examples.acc/accxl_drvld.c:150:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[1024], s2[1024]; data/gplcver-2.12a/tests_and_examples/examples.acc/accxl_drvld.c:156:41: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (mei_isinside(inst, term) == 1) { strcpy(s1, "inside"); count++; } data/gplcver-2.12a/tests_and_examples/examples.acc/accxl_drvld.c:157:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "outside"); data/gplcver-2.12a/tests_and_examples/examples.tf/plimfil.c:46:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((memval_s = fopen(chp, "r")) == NULL) data/gplcver-2.12a/tests_and_examples/examples.tf/plimfil.c:89:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char memval[1024]; data/gplcver-2.12a/tests_and_examples/examples.tf/plimfil2.c:45:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((memval_s = fopen(chp, "r")) == NULL) data/gplcver-2.12a/tests_and_examples/examples.tf/probe.c:13:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char value_ar[10][MAXSIZE][17]; data/gplcver-2.12a/tests_and_examples/examples.vpi/async.c:114:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[128]; data/gplcver-2.12a/tests_and_examples/examples.vpi/async.c:119:38: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (einfop->state == vpiCompile) strcpy(s1, "vpiCompile"); data/gplcver-2.12a/tests_and_examples/examples.vpi/async.c:120:39: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiPLI) strcpy(s1, "vpiPLI"); data/gplcver-2.12a/tests_and_examples/examples.vpi/async.c:121:39: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiRun) strcpy(s1, "vpiRun"); data/gplcver-2.12a/tests_and_examples/examples.vpi/async.c:122:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**unknown**"); data/gplcver-2.12a/tests_and_examples/examples.vpi/dfpsetd.c:90:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[128]; data/gplcver-2.12a/tests_and_examples/examples.vpi/dfpsetd.c:95:38: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (einfop->state == vpiCompile) strcpy(s1, "vpiCompile"); data/gplcver-2.12a/tests_and_examples/examples.vpi/dfpsetd.c:96:39: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiPLI) strcpy(s1, "vpiPLI"); data/gplcver-2.12a/tests_and_examples/examples.vpi/dfpsetd.c:97:39: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiRun) strcpy(s1, "vpiRun"); data/gplcver-2.12a/tests_and_examples/examples.vpi/dfpsetd.c:98:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**unknown**"); data/gplcver-2.12a/tests_and_examples/examples.vpi/findcaus.c:105:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[128]; data/gplcver-2.12a/tests_and_examples/examples.vpi/findcaus.c:110:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (einfop->state == vpiCompile) strcpy(s1, "vpiCompile"); data/gplcver-2.12a/tests_and_examples/examples.vpi/findcaus.c:111:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiPLI) strcpy(s1, "vpiPLI"); data/gplcver-2.12a/tests_and_examples/examples.vpi/findcaus.c:112:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiRun) strcpy(s1, "vpiRun"); data/gplcver-2.12a/tests_and_examples/examples.vpi/findcaus.c:113:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**unknown**"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:96:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[1025]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:128:23: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbValueChange: strcpy(s, "cbValueChange"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:129:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbStmt: strcpy(s, "cbStmt"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:130:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbForce: strcpy(s, "cbForce"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:131:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbRelease: strcpy(s, "cbRelease"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:132:28: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbAtStartOfSimTime: strcpy(s, "cbAtStartOfSimTime"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:133:26: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbReadWriteSynch: strcpy(s, "cbReadWriteSynch"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:134:25: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbReadOnlySynch: strcpy(s, "cbReadOnlySynch"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:135:23: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbNextSimTime: strcpy(s, "cbNextSimTime"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:136:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbAfterDelay: strcpy(s, "cbAfterDelay"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:137:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbEndOfCompile: strcpy(s, "cbEndOfCompile"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:138:29: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbStartOfSimulation: strcpy(s, "cbStartOfSimulation"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:139:27: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbEndOfSimulation: strcpy(s, "cbEndOfSimulation"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:140:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbError: strcpy(s, "cbError"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:141:20: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbPLIError: strcpy(s, "cbPLIError"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:142:25: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbTchkViolation: strcpy(s, "cbTchkViolation"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:143:23: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbStartOfSave: strcpy(s, "cbStartOfSave"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:144:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbEndOfSave: strcpy(s, "cbEndOfSave"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:145:26: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbStartOfRestart: strcpy(s, "cbStartOfRestart"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:146:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbEndOfRestart: strcpy(s, "cbEndOfRestart"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:147:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbStartOfReset: strcpy(s, "cbStartOfReset"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:148:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbEndOfReset: strcpy(s, "cbEndOfReset"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:149:28: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbEnterInteractive: strcpy(s, "cbEnterInteractive"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:150:27: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbExitInteractive: strcpy(s, "cbExitInteractive"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:151:34: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbInteractiveScopeChange: strcpy(s, "cbInteractiveScopeChange"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:152:27: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case cbUnresolvedSystf: strcpy(s, "cbUnresolvedSystf"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:153:12: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. default: strcpy(s, "**unknown**"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:288:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[1024]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:323:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[128]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:328:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (einfop->state == vpiCompile) strcpy(s1, "vpiCompile"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:329:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiPLI) strcpy(s1, "vpiPLI"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:330:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiRun) strcpy(s1, "vpiRun"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:331:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**unknown**"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:414:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[1024]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:417:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, "$remove_all_actions"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:424:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, "$reg_all_actions"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vchkprt1.c:94:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nnam[1025], s1[1025], s2[1025]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vchkprt1.c:199:27: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (mpref == NULL) strcpy(nnam, "*none*"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vchkprt1.c:320:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[1025]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vchkprt1.c:343:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[128]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vchkprt1.c:348:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (einfop->state == vpiCompile) strcpy(s1, "vpiCompile"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vchkprt1.c:349:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiPLI) strcpy(s1, "vpiPLI"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vchkprt1.c:350:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiRun) strcpy(s1, "vpiRun"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vchkprt1.c:351:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**unknown**"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vchkprt1.c:501:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. print_nest_argv((char **) argv[i + 1], lev + 1); data/gplcver-2.12a/tests_and_examples/examples.vpi/vconta1.c:105:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nam[1025]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vconta1.c:223:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[128]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vconta1.c:228:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (einfop->state == vpiCompile) strcpy(s1, "vpiCompile"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vconta1.c:229:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiPLI) strcpy(s1, "vpiPLI"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vconta1.c:230:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiRun) strcpy(s1, "vpiRun"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vconta1.c:231:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**unknown**"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vdrvld1.c:162:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *chp, s1[1025]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vdrvld1.c:171:55: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (htyp == vpiModPathIn || htyp == vpiModPathOut) strcpy(s1, "**NONE(0)"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vdrvld1.c:175:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, "**NONE(0)"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vdrvld1.c:226:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[128]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vdrvld1.c:231:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (einfop->state == vpiCompile) strcpy(s1, "vpiCompile"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vdrvld1.c:232:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiPLI) strcpy(s1, "vpiPLI"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vdrvld1.c:233:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiRun) strcpy(s1, "vpiRun"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vdrvld1.c:234:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**unknown**"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vdrvld2.c:175:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *chp, s1[1025]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vdrvld2.c:184:55: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (htyp == vpiModPathIn || htyp == vpiModPathOut) strcpy(s1, "**NONE(0)"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vdrvld2.c:188:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, "**NONE(0)"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vdrvld2.c:242:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[128]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vdrvld2.c:247:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (einfop->state == vpiCompile) strcpy(s1, "vpiCompile"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vdrvld2.c:248:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiPLI) strcpy(s1, "vpiPLI"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vdrvld2.c:249:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiRun) strcpy(s1, "vpiRun"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vdrvld2.c:250:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**unknown**"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vfopen1.c:68:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[128]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vfopen1.c:73:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (einfop->state == vpiCompile) strcpy(s1, "vpiCompile"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vfopen1.c:74:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiPLI) strcpy(s1, "vpiPLI"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vfopen1.c:75:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiRun) strcpy(s1, "vpiRun"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vfopen1.c:76:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**unknown**"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vfopen2.c:67:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[128]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vfopen2.c:72:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (einfop->state == vpiCompile) strcpy(s1, "vpiCompile"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vfopen2.c:73:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiPLI) strcpy(s1, "vpiPLI"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vfopen2.c:74:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiRun) strcpy(s1, "vpiRun"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vfopen2.c:75:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**unknown**"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vhelbad.c:105:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[128]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vhelbad.c:107:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (einfop->state == vpiCompile) strcpy(s1, "vpiCompile"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vhelbad.c:108:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiPLI) strcpy(s1, "vpiPLI"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vhelbad.c:109:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiRun) strcpy(s1, "vpiRun"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vhelbad.c:110:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**unknown**"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vhello2.c:151:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[128]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vhello2.c:153:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (einfop->state == vpiCompile) strcpy(s1, "vpiCompile"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vhello2.c:154:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiPLI) strcpy(s1, "vpiPLI"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vhello2.c:155:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiRun) strcpy(s1, "vpiRun"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vhello2.c:156:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**unknown**"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg.c:174:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[128]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg.c:179:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (einfop->state == vpiCompile) strcpy(s1, "vpiCompile"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg.c:180:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiPLI) strcpy(s1, "vpiPLI"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg.c:181:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiRun) strcpy(s1, "vpiRun"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg.c:182:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**unknown**"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg2.c:162:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[1024]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg2.c:181:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[1024]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg2.c:189:32: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (valp->value.scalar < 2) sprintf(s, "%x", valp->value.scalar); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg2.c:195:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s, "%d", valp->value.integer); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg2.c:198:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s, "%g", valp->value.real); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg2.c:208:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "(av=%x,bv=%x)", valp->value.vector[i].aval, data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg2.c:214:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s, "<s0=%d,s1=%d,v=%d>", valp->value.strength->s0, data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg2.c:219:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s, "%f", valp->value.time->real); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg2.c:220:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s, "%d", valp->value.time->low); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg2.c:242:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[128]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg2.c:247:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (einfop->state == vpiCompile) strcpy(s1, "vpiCompile"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg2.c:248:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiPLI) strcpy(s1, "vpiPLI"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg2.c:249:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiRun) strcpy(s1, "vpiRun"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg2.c:250:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**unknown**"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:172:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[1024], s2[1024], s3[1024]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:185:29: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (varp->oldvalp == NULL) strcpy(s2, "<unknown>"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:233:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[1024]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:241:32: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (valp->value.scalar < 2) sprintf(s, "%x", valp->value.scalar); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:247:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s, "%d", valp->value.integer); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:250:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s, "%g", valp->value.real); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:260:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s1, "(av=%x,bv=%x)", valp->value.vector[i].aval, data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:266:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s, "<s0=%d,s1=%d,v=%d>", valp->value.strength->s0, data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:271:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s, "%f", valp->value.time->real); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:272:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s, "%d", valp->value.time->low); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:294:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[128]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:299:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (einfop->state == vpiCompile) strcpy(s1, "vpiCompile"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:300:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiPLI) strcpy(s1, "vpiPLI"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:301:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiRun) strcpy(s1, "vpiRun"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:302:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**unknown**"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdel2.c:88:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[1024], s2[1024]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdel2.c:106:42: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (vpi_get(vpiType, href) == vpiUdp) strcpy(s1, "udp"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdel2.c:107:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "gate"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdel2.c:164:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiSetup: strcpy(s, "$setup"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdel2.c:165:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiHold: strcpy(s, "$hold"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdel2.c:166:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiPeriod: strcpy(s, "$period"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdel2.c:167:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiWidth: strcpy(s, "$width"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdel2.c:168:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiSkew: strcpy(s, "$skew"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdel2.c:169:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiRecovery: strcpy(s, "$recovery"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdel2.c:170:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiNoChange: strcpy(s, "$nochange"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdel2.c:171:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiSetupHold: strcpy(s, "$setuphold"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdel2.c:172:12: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. default: strcpy(s, "**out of range**"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdel2.c:184:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[128]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdel2.c:189:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (einfop->state == vpiCompile) strcpy(s1, "vpiCompile"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdel2.c:190:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiPLI) strcpy(s1, "vpiPLI"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdel2.c:191:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiRun) strcpy(s1, "vpiRun"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdel2.c:192:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**unknown**"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdels.c:89:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[1024], s2[1024]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdels.c:111:42: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (vpi_get(vpiType, href) == vpiUdp) strcpy(s1, "udp"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdels.c:112:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "gate"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdels.c:205:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiSetup: strcpy(s, "$setup"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdels.c:206:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiHold: strcpy(s, "$hold"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdels.c:207:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiPeriod: strcpy(s, "$period"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdels.c:208:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiWidth: strcpy(s, "$width"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdels.c:209:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiSkew: strcpy(s, "$skew"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdels.c:210:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiRecovery: strcpy(s, "$recovery"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdels.c:211:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiNoChange: strcpy(s, "$nochange"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdels.c:212:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiSetupHold: strcpy(s, "$setuphold"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdels.c:213:12: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. default: strcpy(s, "**out of range**"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdels.c:225:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[128]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdels.c:230:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (einfop->state == vpiCompile) strcpy(s1, "vpiCompile"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdels.c:231:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiPLI) strcpy(s1, "vpiPLI"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdels.c:232:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiRun) strcpy(s1, "vpiRun"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtdels.c:233:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**unknown**"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetdels.c:83:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[1024], s2[1024]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetdels.c:114:42: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (vpi_get(vpiType, href) == vpiUdp) strcpy(s1, "udp"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetdels.c:115:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "gate"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetdels.c:216:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiSetup: strcpy(s, "$setup"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetdels.c:217:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiHold: strcpy(s, "$hold"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetdels.c:218:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiPeriod: strcpy(s, "$period"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetdels.c:219:18: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiWidth: strcpy(s, "$width"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetdels.c:220:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiSkew: strcpy(s, "$skew"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetdels.c:221:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiRecovery: strcpy(s, "$recovery"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetdels.c:222:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiNoChange: strcpy(s, "$nochange"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetdels.c:223:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case vpiSetupHold: strcpy(s, "$setuphold"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetdels.c:224:12: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. default: strcpy(s, "**out of range**"); break; data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetdels.c:236:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[128]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetdels.c:241:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (einfop->state == vpiCompile) strcpy(s1, "vpiCompile"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetdels.c:242:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiPLI) strcpy(s1, "vpiPLI"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetdels.c:243:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiRun) strcpy(s1, "vpiRun"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetdels.c:244:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**unknown**"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval1.c:25:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *instnam_tab[100]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval1.c:223:4: [2] (buffer) bcopy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. bcopy((char *) valp->value.vector, (char *) wrkval.value.vector, data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval1.c:260:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[128]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval1.c:265:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (einfop->state == vpiCompile) strcpy(s1, "vpiCompile"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval1.c:266:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiPLI) strcpy(s1, "vpiPLI"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval1.c:267:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiRun) strcpy(s1, "vpiRun"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval1.c:268:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**unknown**"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval2.c:22:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *instnam_tab[100]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval2.c:55:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char putv_type[128]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval2.c:125:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else { strcpy(putv_type, "vpiInertialDelay"); flags = vpiInertialDelay; } data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval2.c:202:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sval[1024], s1[1024]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval2.c:306:4: [2] (buffer) bcopy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. bcopy((char *) valp->value.vector, (char *) wrkval.value.vector, data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval2.c:343:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[128]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval2.c:348:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (einfop->state == vpiCompile) strcpy(s1, "vpiCompile"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval2.c:349:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiPLI) strcpy(s1, "vpiPLI"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval2.c:350:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiRun) strcpy(s1, "vpiRun"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval2.c:351:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**unknown**"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vtimcbs.c:161:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[128]; data/gplcver-2.12a/tests_and_examples/examples.vpi/vtimcbs.c:166:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (einfop->state == vpiCompile) strcpy(s1, "vpiCompile"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vtimcbs.c:167:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiPLI) strcpy(s1, "vpiPLI"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vtimcbs.c:168:36: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else if (einfop->state == vpiRun) strcpy(s1, "vpiRun"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vtimcbs.c:169:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(s1, "**unknown**"); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:69:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char curmodG[1000]; /* cur mod hier name */ data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:78:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char scopesG[MAXSCOPES][MAXSIG]; /* scope of mods */ data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:146:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char token[MAXTOKSIZE]; data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:161:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char token[MAXTOKSIZE]; data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:162:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAXTOKSIZE]; data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:178:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *tnum = atoi(tok); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:311:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char signame[MAXSIG]; data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:312:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ident[10]; data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:313:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char token[MAXTOKSIZE]; data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:336:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). bits = atoi(token); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:422:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sep[2]; data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:426:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char token[MAXTOKSIZE]; data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:882:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char token[MAXTOKSIZE]; data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:984:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAXTOKSIZE], sig[MAXTOKSIZE]; data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:1046:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char svalue1[MAXTOKSIZE], svalue2[MAXTOKSIZE]; data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:1333:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char token[MAXTOKSIZE];; data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:1407:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[30]; data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:1484:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fp1 = fopen(argv[argc-2], "r")) == NULL) data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:1493:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fp2 = fopen(argv[argc-1], "r")) == NULL) data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:1508:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. file_nam2 = (char *) malloc(strlen(argv[argc-1]) + 1); data/gplcver-2.12a/src/cver.c:1745:48: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if ((chp = (char *) getenv ("HOME")) == NULL) strcpy(__pv_homedir, "."); data/gplcver-2.12a/src/cver.c:1749:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(__pv_homedir); data/gplcver-2.12a/src/cver.c:2283:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((int32) strlen(argv[i]) >= IDLEN - 1) data/gplcver-2.12a/src/cver.c:2605:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(chp) == 1) data/gplcver-2.12a/src/cver.c:2707:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (__tr_fnam != NULL) __my_free(__tr_fnam, strlen(__tr_fnam) + 1); data/gplcver-2.12a/src/cver.c:2729:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __my_free(__sdf_opt_log_fnam, strlen(__sdf_opt_log_fnam) + 1); data/gplcver-2.12a/src/cver.c:2960:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(chp2); data/gplcver-2.12a/src/cver.c:3345:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(pthnam, ""); data/gplcver-2.12a/src/cver.c:3362:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(fnam, sdfloc, chp - sdfloc); data/gplcver-2.12a/src/cver.c:3430:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s1, chp, chp2 - chp); data/gplcver-2.12a/src/cver.c:3453:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(&(optnam[1]), s1, chp - s1); data/gplcver-2.12a/src/cver.c:3460:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(optval); data/gplcver-2.12a/src/cver.c:3494:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(incdirptr); data/gplcver-2.12a/src/cver.c:3523:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s1, cpbg, len); data/gplcver-2.12a/src/cver.c:3559:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(loadpliptr); data/gplcver-2.12a/src/cver.c:3587:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(lbnam, loadpliptr, cp - loadpliptr); data/gplcver-2.12a/src/cver.c:3657:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s1, chp2, len); data/gplcver-2.12a/src/cver.c:3685:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(rnams) == 1 && rnams[0] == ',') return(FALSE); data/gplcver-2.12a/src/cver.c:3716:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(lbxptr); data/gplcver-2.12a/src/cver.c:3741:17: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). if (len > 0) strncpy(s1, cpbg, len); data/gplcver-2.12a/src/cver.c:3850:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s1, cpbg, len); data/gplcver-2.12a/src/cver.c:4945:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mlen = strlen(mdp->msym->synam); data/gplcver-2.12a/src/cver.c:4948:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s, mdp->msym->synam, fldsiz - 4); data/gplcver-2.12a/src/cver.c:4956:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((mlen = strlen(mdp->msym->synam)) > fldsiz) data/gplcver-2.12a/src/cver.c:4958:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s, mdp->msym->synam, fldsiz - 1); data/gplcver-2.12a/src/cver.c:5054:19: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (prts == 0) strcpy(s1, ""); else sprintf(s1, "%d(%d)", prts, prtbits); data/gplcver-2.12a/src/cver.c:5055:20: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (wires == 0) strcpy(s2, ""); data/gplcver-2.12a/src/cver.c:5057:19: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (regs == 0) strcpy(s3, ""); else sprintf(s3, "%d(%d)", regs, regbits); data/gplcver-2.12a/src/cver.c:5058:19: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (arrs == 0) strcpy(s4, ""); data/gplcver-2.12a/src/cver.c:5065:21: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (tot_prts == 0) strcpy(s1, ""); data/gplcver-2.12a/src/cver.c:5067:22: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (tot_wires == 0) strcpy(s2, ""); data/gplcver-2.12a/src/cver.c:5069:21: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (tot_regs == 0) strcpy(s3, ""); data/gplcver-2.12a/src/cver.c:5071:21: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (tot_arrs == 0) strcpy(s4, ""); data/gplcver-2.12a/src/cver.c:5180:24: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (st_prts == 0) { strcpy(s1, ""); strcpy(s2, ""); } data/gplcver-2.12a/src/cver.c:5180:40: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (st_prts == 0) { strcpy(s1, ""); strcpy(s2, ""); } data/gplcver-2.12a/src/cver.c:5187:25: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (st_wires == 0) { strcpy(s3, ""); strcpy(s4, ""); } data/gplcver-2.12a/src/cver.c:5187:41: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (st_wires == 0) { strcpy(s3, ""); strcpy(s4, ""); } data/gplcver-2.12a/src/cver.c:5200:26: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (st_tot_prts == 0) { strcpy(s1, ""); strcpy(s2, ""); } data/gplcver-2.12a/src/cver.c:5200:42: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (st_tot_prts == 0) { strcpy(s1, ""); strcpy(s2, ""); } data/gplcver-2.12a/src/cver.c:5207:24: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (tot_wires == 0) { strcpy(s3, ""); strcpy(s4, ""); } data/gplcver-2.12a/src/cver.c:5207:40: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (tot_wires == 0) { strcpy(s3, ""); strcpy(s4, ""); } data/gplcver-2.12a/src/cver.c:5423:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(syp->synam) > 24) data/gplcver-2.12a/src/cver.c:5424:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). { strncpy(s1, syp->synam, 23); s1[23] = '-'; s1[24] = '\0'; } data/gplcver-2.12a/src/cver.c:5447:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(syp->synam) > 24) data/gplcver-2.12a/src/cver.c:5448:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). { strncpy(s1, syp->synam, 23); s1[23] = '-'; s1[24] = '\0'; } data/gplcver-2.12a/src/cver.c:5504:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(imdp->msym->synam) > 24) data/gplcver-2.12a/src/cver.c:5505:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). { strncpy(s1, imdp->msym->synam, 23); s1[23] = '-'; s1[24] = '\0'; } data/gplcver-2.12a/src/cver.c:5518:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(udpp->usym->synam) > 24) data/gplcver-2.12a/src/cver.c:5519:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). { strncpy(s1, udpp->usym->synam, 23); s1[23] = '-'; s1[24] = '\0'; } data/gplcver-2.12a/src/v_acc.c:612:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __my_free(__acc_developmentversion, strlen(__acc_developmentversion) + 1); data/gplcver-2.12a/src/v_acc.c:613:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __acc_developmentversion = __my_malloc(strlen(value) + 1); data/gplcver-2.12a/src/v_acc.c:686:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __my_free(__acc_pathdelimstr, strlen(__acc_pathdelimstr) + 1); data/gplcver-2.12a/src/v_acc.c:687:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __acc_pathdelimstr = __my_malloc(strlen(value) + 1); data/gplcver-2.12a/src/v_acc.c:1079:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(s); data/gplcver-2.12a/src/v_acc.c:2586:44: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. default: __acc_terr(__FILE__, __LINE__); strcpy(s, ""); data/gplcver-2.12a/src/v_acc.c:3587:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __my_free(__acc_developmentversion, strlen(__acc_developmentversion) + 1); data/gplcver-2.12a/src/v_acc.c:3588:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __acc_developmentversion = __my_malloc(strlen(s1) + 1); data/gplcver-2.12a/src/v_acc.c:3600:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s1, "$"); data/gplcver-2.12a/src/v_acc.c:3602:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __my_free(__acc_pathdelimstr, strlen(__acc_pathdelimstr) + 1); data/gplcver-2.12a/src/v_acc.c:3603:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __acc_pathdelimstr = __my_malloc(strlen(s1) + 1); data/gplcver-2.12a/src/v_acc.c:7118:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s1, ""); data/gplcver-2.12a/src/v_acc.c:8473:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s1, ""); data/gplcver-2.12a/src/v_acc.c:8489:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_acc.c:8489:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_acc.c:8534:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s1, ""); data/gplcver-2.12a/src/v_acc.c:8549:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_acc.c:8549:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_acc.c:8591:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s1, ""); data/gplcver-2.12a/src/v_acc.c:8607:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_acc.c:8607:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_acc.c:8651:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s1, ""); data/gplcver-2.12a/src/v_acc.c:8666:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_acc.c:8666:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_cnv.c:516:6: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(rfmtstr, ""); data/gplcver-2.12a/src/v_cnv.c:782:31: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (fmt_pos == -1) strcpy(s1, ""); data/gplcver-2.12a/src/v_cnv.c:1083:12: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s1, "0"); data/gplcver-2.12a/src/v_cnv.c:1099:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = 0; i < ochnum - (int32) strlen(s1); i++) addch_(' '); data/gplcver-2.12a/src/v_cnv.c:1147:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = 0; i < ochnum - (int32) strlen(s1); i++) addch_(' '); data/gplcver-2.12a/src/v_cnv.c:1268:21: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (fmt_pos == -1) strcpy(s1, ""); else sprintf(s1, " (pos. %d)", fmt_pos); data/gplcver-2.12a/src/v_cnv.c:1310:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(s, "%*.*f%s", (int32) (__tfmt_minfwid - strlen(__tfmt_suf)), data/gplcver-2.12a/src/v_cnv.c:1736:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(&(__exprline[sav_sofs])); data/gplcver-2.12a/src/v_cnv.c:1986:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((slen = strlen(s)) < newsize) return; data/gplcver-2.12a/src/v_cnv.c:2715:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s1, ""); data/gplcver-2.12a/src/v_cnv.c:3711:28: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. || np->ntyp == N_REAL) strcpy(s1, ""); data/gplcver-2.12a/src/v_cnv.c:3803:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(wnam, ""); data/gplcver-2.12a/src/v_cnv.c:3843:26: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. || np->ntyp == N_REAL) strcpy(s1, ""); data/gplcver-2.12a/src/v_cnv.c:4275:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(s1); data/gplcver-2.12a/src/v_cnv.c:4292:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(s1); data/gplcver-2.12a/src/v_cnv.c:4881:32: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. || regp->ntyp == N_REAL) strcpy(s1, ""); data/gplcver-2.12a/src/v_cnv.c:4898:30: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. || regp->ntyp == N_REAL) strcpy(s1, ""); data/gplcver-2.12a/src/v_cnv.c:4931:30: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. || regp->ntyp == N_REAL) strcpy(s1, ""); data/gplcver-2.12a/src/v_cnv.c:5188:2: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(s, ">"); data/gplcver-2.12a/src/v_cnv.c:5597:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s, ""); data/gplcver-2.12a/src/v_cnv.c:5624:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s, ""); data/gplcver-2.12a/src/v_cnv.c:5908:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ll = strlen(s); data/gplcver-2.12a/src/v_cnv.c:6013:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(s); data/gplcver-2.12a/src/v_dbg.c:1626:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). prmplen = strlen(s1); data/gplcver-2.12a/src/v_dbg.c:1819:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s1, ":"); data/gplcver-2.12a/src/v_dbg.c:2051:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). alen = strlen(aval); data/gplcver-2.12a/src/v_dbg.c:2054:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). alen2 = strlen(cmdtab[i].lnam); data/gplcver-2.12a/src/v_dbg.c:2085:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). alen = strlen(aval); data/gplcver-2.12a/src/v_dbg.c:2896:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (__toktyp != ID || strlen(__token) > 40) data/gplcver-2.12a/src/v_dbg.c:2903:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s1, ":"); data/gplcver-2.12a/src/v_dbg.c:2997:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(__token) > 1) data/gplcver-2.12a/src/v_dbg.c:3194:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(__token) > 1) data/gplcver-2.12a/src/v_dbg.c:3292:15: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case BNONE: strcpy(s, ""); break; data/gplcver-2.12a/src/v_dbg.c:3293:12: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. default: strcpy(s, "?"); __case_terr(__FILE__, __LINE__); data/gplcver-2.12a/src/v_dbg.c:3340:2: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(s, ">"); data/gplcver-2.12a/src/v_dbg2.c:611:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((cnt = read(__list_cur_fd, ctab, 1)) != 1) break; data/gplcver-2.12a/src/v_dbg2.c:623:33: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). } while (c != '\n' && (cnt = read(__list_cur_fd, ctab, 1)) == 1); data/gplcver-2.12a/src/v_dbg2.c:744:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((bytes = read(fd, buf, buf_size)) != buf_size) data/gplcver-2.12a/src/v_dbg2.c:1068:12: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. default: strcpy(s, "?"); __case_terr(__FILE__, __LINE__); data/gplcver-2.12a/src/v_dbg2.c:1089:25: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (dxp->dsp_enable) strcpy(s1, "y"); else strcpy(s1, "n"); data/gplcver-2.12a/src/v_dbg2.c:1089:47: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (dxp->dsp_enable) strcpy(s1, "y"); else strcpy(s1, "n"); data/gplcver-2.12a/src/v_dbg2.c:1196:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(sref, savchp, endchp - savchp); data/gplcver-2.12a/src/v_dbg2.c:1277:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(sref, chp1, rlen); data/gplcver-2.12a/src/v_dbg2.c:1293:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(argref, sref, chp - sref); data/gplcver-2.12a/src/v_dbg2.c:1725:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). llen = strlen(iahp->iah_lp); data/gplcver-2.12a/src/v_dbg2.c:1864:28: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (bpp->bp_tskp == NULL) strcpy(s1, ""); data/gplcver-2.12a/src/v_dbg2.c:1867:42: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (is_tmp) strcpy(s2, " (temp)"); else strcpy(s2, ""); data/gplcver-2.12a/src/v_dbg2.c:2028:42: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (is_tmp) strcpy(s1, " (temp)"); else strcpy(s1, ""); data/gplcver-2.12a/src/v_dbg2.c:2057:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(sref, savchp, endchp - savchp); data/gplcver-2.12a/src/v_dbg2.c:3215:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __my_free(__dv_fnam, strlen(__dv_fnam) + 1); data/gplcver-2.12a/src/v_dbg2.c:3258:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __my_free(chp, strlen(chp) + 1); data/gplcver-2.12a/src/v_dbg2.c:3487:22: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (tskp == NULL) strcpy(s1, ""); data/gplcver-2.12a/src/v_del.c:703:28: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (pnptyp == PNP_TCHKP1) strcpy(s2, ""); else strcpy(s2, " 2nd"); data/gplcver-2.12a/src/v_ex.c:1228:6: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s2, ""); data/gplcver-2.12a/src/v_ex.c:1261:6: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s2, ""); data/gplcver-2.12a/src/v_ex.c:1620:20: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (wp == NULL) strcpy(vs2, ""); else strcpy(vs2, "(rhs)"); data/gplcver-2.12a/src/v_ex.c:1921:20: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (wp == NULL) strcpy(vs2, ""); else strcpy(vs2, "(rhs)"); data/gplcver-2.12a/src/v_ex.c:3339:10: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = fgetc(__fio_fdtab[fd]->fd_s); data/gplcver-2.12a/src/v_ex.c:3879:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(chp) < arglen) continue; data/gplcver-2.12a/src/v_ex.c:4007:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(chp) < namlen) continue; data/gplcver-2.12a/src/v_ex.c:4022:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __my_free(__fiofp, strlen(__fiofp) + 1); data/gplcver-2.12a/src/v_ex.c:4905:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). oslen = strlen(__dv_fnam); data/gplcver-2.12a/src/v_ex.c:5166:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(chp); data/gplcver-2.12a/src/v_ex.c:5332:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __my_free(__tr_fnam, strlen(__tr_fnam) + 1); data/gplcver-2.12a/src/v_ex.c:5417:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __my_free(__mulchan_tab[i].mc_fnam, strlen(__mulchan_tab[i].mc_fnam) + 1); data/gplcver-2.12a/src/v_ex.c:5464:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return(__mc1_fopen(chp, strlen(chp), FALSE)); data/gplcver-2.12a/src/v_ex.c:6720:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __my_free((char *) __tfmt_suf, strlen(__tfmt_suf) + 1); data/gplcver-2.12a/src/v_ex.c:6817:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __my_free(__log_fnam, strlen(__log_fnam) + 1); data/gplcver-2.12a/src/v_ex.c:6860:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (__tr_fnam != NULL) __my_free(__tr_fnam, strlen(__tr_fnam) + 1); data/gplcver-2.12a/src/v_ex.c:6875:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (__tr_fnam != NULL) __my_free(__tr_fnam, strlen(__tr_fnam) + 1); data/gplcver-2.12a/src/v_ex.c:7100:37: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (strcmp(ver_mode, "rb") == 0) { strcpy(os_mode, "r"); return(TRUE); } data/gplcver-2.12a/src/v_ex.c:7102:37: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (strcmp(ver_mode, "wb") == 0) { strcpy(os_mode, "w"); return(TRUE); } data/gplcver-2.12a/src/v_ex.c:7104:37: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (strcmp(ver_mode, "ab") == 0) { strcpy(os_mode, "a"); return(TRUE); } data/gplcver-2.12a/src/v_ex.c:7160:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(__fio_fdtab[fd]->fd_name); data/gplcver-2.12a/src/v_ex.c:7323:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). chlen = strlen(lp); data/gplcver-2.12a/src/v_ex.c:8257:6: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = fgetc(f); data/gplcver-2.12a/src/v_ex.c:8574:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(stren, s, 2); data/gplcver-2.12a/src/v_ex2.c:2474:9: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return(getc(f)); data/gplcver-2.12a/src/v_ex3.c:602:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s1, ""); data/gplcver-2.12a/src/v_ex3.c:677:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s1, ""); data/gplcver-2.12a/src/v_ex3.c:776:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s1, ""); data/gplcver-2.12a/src/v_ex3.c:1463:31: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (qcvalp->qclhsbi == -1) strcpy(__xs, ""); data/gplcver-2.12a/src/v_ex3.c:2845:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s1, ""); data/gplcver-2.12a/src/v_ex3.c:3088:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s1, ""); data/gplcver-2.12a/src/v_ex3.c:3122:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s1, ""); data/gplcver-2.12a/src/v_ex4.c:964:49: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (xp->x_stren) strcpy(s2, "strength "); else strcpy(s2, ""); data/gplcver-2.12a/src/v_ex4.c:1584:51: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (np->n_stren) strcpy(s1, " strength"); else strcpy(s1, ""); data/gplcver-2.12a/src/v_ex4.c:1635:51: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (np->n_stren) strcpy(s1, " strength"); else strcpy(s1, ""); data/gplcver-2.12a/src/v_ex4.c:3751:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(ndxs, ""); data/gplcver-2.12a/src/v_ex4.c:3811:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s3, ""); data/gplcver-2.12a/src/v_ex4.c:3840:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s2, ""); data/gplcver-2.12a/src/v_ex4.c:4157:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s1, ""); data/gplcver-2.12a/src/v_ex4.c:4160:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s2, ""); data/gplcver-2.12a/src/v_ex4.c:4161:61: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (np->n_isarr) sprintf(s4, __to_arr_range(s3, np)); else strcpy(s4, ""); data/gplcver-2.12a/src/v_ex4.c:4217:2: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(s, ">"); data/gplcver-2.12a/src/v_ex4.c:4252:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(ndxs, ""); data/gplcver-2.12a/src/v_fx.c:1075:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(chp); data/gplcver-2.12a/src/v_fx.c:1107:49: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (is_dir) strcpy(__xs, " directory"); else strcpy(__xs, ""); data/gplcver-2.12a/src/v_fx.c:5597:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s1, chp, chp2 - chp); data/gplcver-2.12a/src/v_fx.c:5611:8: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s2, chp2, chp3 - chp2); data/gplcver-2.12a/src/v_fx.c:5625:8: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s1, chp, chp2 - chp); data/gplcver-2.12a/src/v_fx.c:5633:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(chp); data/gplcver-2.12a/src/v_fx.c:5653:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s2, s1, chp - s1); data/gplcver-2.12a/src/v_fx.c:5664:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s3, chp, chp2 - chp); data/gplcver-2.12a/src/v_fx.c:5835:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (grp->gnam != NULL) __my_free((char *) grp->gnam, strlen(grp->gnam + 1)); data/gplcver-2.12a/src/v_fx2.c:2954:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(__timstr_unitsuf, ""); data/gplcver-2.12a/src/v_fx3.c:5803:49: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (num_peinels == 0 && pxlp->xpnxt == NULL) strcpy(s1, ""); data/gplcver-2.12a/src/v_fx3.c:5810:50: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (num_peoutels == 0 && pxlp->xpnxt == NULL) strcpy(s1, ""); data/gplcver-2.12a/src/v_ms.c:722:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __my_free((char *) macap->macargnam, strlen(macap->macargnam) + 1); data/gplcver-2.12a/src/v_ms.c:764:18: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (!has_err) { strcpy(dnam, "`"); strcat(dnam, __token); } data/gplcver-2.12a/src/v_ms.c:804:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. { strcpy(__macwrkstr, " "); goto do_nonarg; } data/gplcver-2.12a/src/v_ms.c:870:18: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (!has_err) { strcpy(dnam, "`"); strcat(dnam, __token); } data/gplcver-2.12a/src/v_ms.c:893:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else __my_free(syp->el.edfchp, strlen(syp->el.edfchp) + 1); data/gplcver-2.12a/src/v_ms.c:1070:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(argnam, chp2, chp3 - chp2); data/gplcver-2.12a/src/v_ms.c:1283:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(idnam, startid, chp - startid); data/gplcver-2.12a/src/v_ms.c:1291:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(mxp->leading_str, startchp, startid - startchp); data/gplcver-2.12a/src/v_ms.c:1330:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(mxp->leading_str, startchp, chp - startchp); data/gplcver-2.12a/src/v_ms.c:1393:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __my_free(syp->el.edfchp, strlen(syp->el.edfchp) + 1); data/gplcver-2.12a/src/v_ms.c:1460:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __my_free(syp->el.edfchp, strlen(syp->el.edfchp) + 1); data/gplcver-2.12a/src/v_ms.c:1528:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). plen = strlen(cp) - 1; data/gplcver-2.12a/src/v_ms.c:1577:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). inflen = strlen(incfnam); data/gplcver-2.12a/src/v_ms.c:1580:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). plen = strlen(__incdirs[idi]) + inflen + 1; data/gplcver-2.12a/src/v_ms.c:1835:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(chp); data/gplcver-2.12a/src/v_ms.c:2114:11: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). else c = getc(f); data/gplcver-2.12a/src/v_ms.c:2461:6: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(__strtoken, ""); data/gplcver-2.12a/src/v_ms.c:2579:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(s); data/gplcver-2.12a/src/v_ms.c:2671:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(nwidtoken, ""); data/gplcver-2.12a/src/v_ms.c:2747:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(nwidtoken, ""); data/gplcver-2.12a/src/v_ms.c:2769:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(__numtoken) < 10) data/gplcver-2.12a/src/v_ms.c:2915:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(__numtoken, "0"); data/gplcver-2.12a/src/v_ms.c:2955:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(s); data/gplcver-2.12a/src/v_ms.c:3043:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). chlen = strlen(__numtoken); data/gplcver-2.12a/src/v_ms.c:3542:14: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case SEMI: strcpy(__token, ";"); break; data/gplcver-2.12a/src/v_ms.c:3543:15: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case COMMA: strcpy(__token, ","); break; data/gplcver-2.12a/src/v_ms.c:3544:15: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case COLON: strcpy(__token, ":"); break; data/gplcver-2.12a/src/v_ms.c:3545:15: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case SHARP: strcpy(__token, "#"); break; data/gplcver-2.12a/src/v_ms.c:3546:14: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case LPAR: strcpy(__token, "("); break; data/gplcver-2.12a/src/v_ms.c:3547:14: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case RPAR: strcpy(__token, ")"); break; data/gplcver-2.12a/src/v_ms.c:3548:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case LSB: strcpy(__token, "["); break; data/gplcver-2.12a/src/v_ms.c:3549:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case RSB: strcpy(__token, "]"); break; data/gplcver-2.12a/src/v_ms.c:3550:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case LCB: strcpy(__token, "{"); break; data/gplcver-2.12a/src/v_ms.c:3551:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case RCB: strcpy(__token, "}"); break; data/gplcver-2.12a/src/v_ms.c:3552:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case DOT: strcpy(__token, "."); break; data/gplcver-2.12a/src/v_ms.c:3553:15: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case QUEST: strcpy(__token, "?"); break; data/gplcver-2.12a/src/v_ms.c:3554:12: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case AT: strcpy(__token, "@"); break; data/gplcver-2.12a/src/v_ms.c:3556:14: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case PLUS: strcpy(__token, "+"); break; data/gplcver-2.12a/src/v_ms.c:3557:15: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case MINUS: strcpy(__token, "-"); break; data/gplcver-2.12a/src/v_ms.c:3558:15: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case TIMES: strcpy(__token, "*"); break; data/gplcver-2.12a/src/v_ms.c:3559:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case DIV: strcpy(__token, "/"); break; data/gplcver-2.12a/src/v_ms.c:3560:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case MOD: strcpy(__token, "%"); break; data/gplcver-2.12a/src/v_ms.c:3561:16: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case BITNOT: strcpy(__token, "~"); break; data/gplcver-2.12a/src/v_ms.c:3562:19: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case BITREDAND: strcpy(__token, "&"); break; data/gplcver-2.12a/src/v_ms.c:3563:18: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case BITREDOR: strcpy(__token, "|"); break; data/gplcver-2.12a/src/v_ms.c:3564:19: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case BITREDXOR: strcpy(__token, "^"); break; data/gplcver-2.12a/src/v_ms.c:3568:15: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case RELGT: strcpy(__token, ">"); break; data/gplcver-2.12a/src/v_ms.c:3570:15: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case RELLT: strcpy(__token, "<"); break; data/gplcver-2.12a/src/v_ms.c:3577:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case NOT: strcpy(__token, "!"); break; data/gplcver-2.12a/src/v_ms.c:3582:12: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case EQ: strcpy(__token, "="); break; data/gplcver-2.12a/src/v_ms.c:4255:14: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((c = getc(f)) == ' ' || c == '\t' || c == '\f' || c == '\r') ; data/gplcver-2.12a/src/v_ms.c:4270:13: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c = getc(f)) == EOF) return(TEOF); data/gplcver-2.12a/src/v_ms.c:4323:14: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((c = getc(f)) == ' ' || c == '\t' || c == '\f' || c == '\r') ; data/gplcver-2.12a/src/v_ms.c:4335:8: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getc(f); data/gplcver-2.12a/src/v_ms.c:4346:31: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (c == '\\') { c = getc(f); continue; } data/gplcver-2.12a/src/v_ms.c:4349:14: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getc(f); data/gplcver-2.12a/src/v_ms.c:4357:12: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getc(f); data/gplcver-2.12a/src/v_ms.c:4382:10: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getc(f); data/gplcver-2.12a/src/v_ms.c:4396:13: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c = getc(f)) == EOF) { __toktyp = CFG_EOF; return(CFG_EOF); } data/gplcver-2.12a/src/v_ms.c:4437:19: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case CFG_COMMA: strcpy(s, ","); break; data/gplcver-2.12a/src/v_ms.c:4438:18: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case CFG_SEMI: strcpy(s, ";"); break; data/gplcver-2.12a/src/v_ms.c:4464:12: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c2 = getc(f)) == '/') data/gplcver-2.12a/src/v_ms.c:4466:16: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((c = getc(f)) != '\n') if (c == EOF) { ungetc(c, f); return(TRUE); } data/gplcver-2.12a/src/v_ms.c:4474:16: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((c = getc(f)) != '*') data/gplcver-2.12a/src/v_ms.c:4480:18: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c2 = getc(f)) == '*') data/gplcver-2.12a/src/v_ms.c:4490:13: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c = getc(f)) == '/') return(TRUE); data/gplcver-2.12a/src/v_ms.c:4609:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (*s == '\0') slen = 1; else slen = strlen(s) + 1; data/gplcver-2.12a/src/v_ms.c:5033:43: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else { __case_terr(__FILE__, __LINE__); strcpy(s,""); } data/gplcver-2.12a/src/v_ms.c:5105:20: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. if (st01dir == 0) strcat(s, "0"); data/gplcver-2.12a/src/v_ms.c:5106:25: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. else if (st01dir == 1) strcat(s, "1"); data/gplcver-2.12a/src/v_ms.c:5458:37: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. __case_terr(__FILE__, __LINE__); strcpy(s, ""); data/gplcver-2.12a/src/v_ms.c:5560:11: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case 0: strcpy(s, "0"); break; data/gplcver-2.12a/src/v_ms.c:5561:11: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case 1: strcpy(s, "1"); break; data/gplcver-2.12a/src/v_ms.c:5562:11: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case 2: strcpy(s, "z"); break; data/gplcver-2.12a/src/v_ms.c:5563:20: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case 3: default: strcpy(s, "x"); break; data/gplcver-2.12a/src/v_ms.c:5572:11: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case 0: strcpy(s, "0"); break; data/gplcver-2.12a/src/v_ms.c:5573:11: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case 1: strcpy(s, "1"); break; data/gplcver-2.12a/src/v_ms.c:5574:12: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. default: strcpy(s, "x"); break; data/gplcver-2.12a/src/v_ms.c:5635:16: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case NOEDGE: strcpy(s, ""); break; data/gplcver-2.12a/src/v_ms.c:5669:4: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(s, "]"); data/gplcver-2.12a/src/v_ms.c:5705:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (*s == '\0') slen = 1; else slen = strlen(s) + 1; data/gplcver-2.12a/src/v_ms.c:5906:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(usernam, &(pthnam[1]), chp - pthnam - 1); data/gplcver-2.12a/src/v_ms.c:5922:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hlen = strlen(chp2); data/gplcver-2.12a/src/v_ms.c:5923:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). plen = strlen(pthnam); data/gplcver-2.12a/src/v_ms.c:6008:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(s2); data/gplcver-2.12a/src/v_ms.c:6010:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). else { strncpy(s1, s2, sendi); strcpy(&s1[sendi], "..."); } data/gplcver-2.12a/src/v_ms.c:6306:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6306:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6354:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6354:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6398:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6398:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6435:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s1, ""); data/gplcver-2.12a/src/v_ms.c:6448:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6448:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6487:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s1, ""); data/gplcver-2.12a/src/v_ms.c:6500:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6500:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6551:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6551:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6612:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6612:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6654:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s1, ""); data/gplcver-2.12a/src/v_ms.c:6667:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6667:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6712:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s1, ""); data/gplcver-2.12a/src/v_ms.c:6726:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6726:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6808:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6808:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6864:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6864:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6902:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s1, ""); data/gplcver-2.12a/src/v_ms.c:6916:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6916:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6957:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s1, ""); data/gplcver-2.12a/src/v_ms.c:6971:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:6971:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:7050:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:7050:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:7095:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:7095:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:7134:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s1, ""); data/gplcver-2.12a/src/v_ms.c:7147:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:7147:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:7188:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s1, ""); data/gplcver-2.12a/src/v_ms.c:7201:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_ms.c:7201:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(vpis1) + strlen(vpis2) + 1; data/gplcver-2.12a/src/v_prp.c:777:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(s); data/gplcver-2.12a/src/v_prp2.c:581:24: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (np->vec_scalared) strcpy(s2, ""); else strcpy(s2, " vectored"); data/gplcver-2.12a/src/v_prp2.c:5849:33: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (!np->n_isavec || bi == -1) strcpy(s, ""); data/gplcver-2.12a/src/v_prp2.c:7262:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((int32) strlen(s1) >= RECLEN - 1) s1[RECLEN - 1] = '\0'; data/gplcver-2.12a/src/v_sdf.c:674:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __sdf_log_fnam = __my_malloc(strlen(sdflogfn_chp) + 1); data/gplcver-2.12a/src/v_sdf.c:917:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(__sdf_version) + 1; data/gplcver-2.12a/src/v_sdf.c:923:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(__sdf_design) + 1; data/gplcver-2.12a/src/v_sdf.c:929:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(__sdf_date) + 1; data/gplcver-2.12a/src/v_sdf.c:935:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(__sdf_vendor) + 1; data/gplcver-2.12a/src/v_sdf.c:941:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(__sdf_program) + 1; data/gplcver-2.12a/src/v_sdf.c:947:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(__sdf_progversion) + 1; data/gplcver-2.12a/src/v_sdf.c:953:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(__sdf_process) + 1; data/gplcver-2.12a/src/v_sdf.c:1193:11: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). do { c = getc(f); } while(vis_white_(c)); data/gplcver-2.12a/src/v_sdf.c:1320:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(inam, ""); data/gplcver-2.12a/src/v_sdf.c:1321:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(ginam, ""); data/gplcver-2.12a/src/v_sdf.c:2561:17: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (si1 == -1) strcpy(s1, ""); data/gplcver-2.12a/src/v_sdf.c:2565:17: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (di1 == -1) strcpy(s2, ""); data/gplcver-2.12a/src/v_sdf.c:4192:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (tctp->tnam != NULL) __my_free(tctp->tnam, strlen(tctp->tnam) + 1); data/gplcver-2.12a/src/v_sdf.c:4193:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (tctp->cndnam != NULL) __my_free(tctp->cndnam, strlen(tctp->cndnam) + 1); data/gplcver-2.12a/src/v_sdf.c:4383:61: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (mpp->mpwide > 1) sprintf(s1, " bit %d", ndx); else strcpy(s1, ""); data/gplcver-2.12a/src/v_sdf.c:4836:62: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (dmpp->mpwide > 1) sprintf(s1, " bit %d", ndx); else strcpy(s1, ""); data/gplcver-2.12a/src/v_sdf.c:4954:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else { strcpy(portdst, ""); si1 = si2 = -1; } data/gplcver-2.12a/src/v_sdf.c:6474:29: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). do { ctval = sdf_ctab[(c = getc(f)) & 0x7f]; } while (ctval == 1); data/gplcver-2.12a/src/v_sdf.c:6479:31: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). do { ctval = sdf_ctab[(c = getc(f)) & 0x7f]; } while (ctval == 1); data/gplcver-2.12a/src/v_sdf.c:6504:8: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getc(f) & 0x7f; data/gplcver-2.12a/src/v_sdf.c:6508:9: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c1 = getc(f) & 0x7f; data/gplcver-2.12a/src/v_sdf.c:6526:28: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ctval = sdf_ctab[(c = getc(f)) & 0x7f]; data/gplcver-2.12a/src/v_sdf.c:6536:14: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c1 = getc(f)) == '^') { __toktyp = REDXNOR; return; } data/gplcver-2.12a/src/v_sdf.c:6541:14: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c1 = getc(f)) == '&') { __toktyp = BOOLAND; return; } data/gplcver-2.12a/src/v_sdf.c:6546:14: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c1 = getc(f)) == '|') { __toktyp = BOOLOR; return; } data/gplcver-2.12a/src/v_sdf.c:6551:14: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c1 = getc(f)) == '~') { __toktyp = REDXNOR; return; } data/gplcver-2.12a/src/v_sdf.c:6557:14: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c1 = getc(f)) != '=') data/gplcver-2.12a/src/v_sdf.c:6565:14: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c1 = getc(f)) != '=') { ungetc(c1, f); __toktyp = RELEQ; return; } data/gplcver-2.12a/src/v_sdf.c:6569:14: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c1 = getc(f)) != '=') { ungetc(c1, f); __toktyp = NOT; return; } data/gplcver-2.12a/src/v_sdf.c:6570:14: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c1 = getc(f)) != '=') { ungetc(c1, f); __toktyp = RELNEQ; return; } data/gplcver-2.12a/src/v_sdf.c:6574:14: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c1 = getc(f)) == '=') { __toktyp = RELGE; return; } data/gplcver-2.12a/src/v_sdf.c:6578:16: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c1 = getc(f)) == '>') { __toktyp = ASHIFTR; return; } data/gplcver-2.12a/src/v_sdf.c:6587:14: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c1 = getc(f)) == '=') { __toktyp = RELLE; return; } data/gplcver-2.12a/src/v_sdf.c:6591:16: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c1 = getc(f)) == '<') { __toktyp = ASHIFTL; return; } data/gplcver-2.12a/src/v_sdf.c:6601:8: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getc(f); data/gplcver-2.12a/src/v_sdf.c:6622:9: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c1 = getc(f) & 0x7f; data/gplcver-2.12a/src/v_sdf.c:6625:8: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getc(f) & 0x7f; data/gplcver-2.12a/src/v_sdf.c:6639:28: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ctval = sdf_ctab[(c = getc(f)) & 0x7f]; data/gplcver-2.12a/src/v_sdf.c:6676:8: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getc(f); data/gplcver-2.12a/src/v_sdf.c:6696:10: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getc(f); data/gplcver-2.12a/src/v_sdf.c:6729:7: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c2 = getc(f); data/gplcver-2.12a/src/v_sdf.c:6737:16: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((c = getc(f)) != '\n') if (c == EOF) return(TEOF); data/gplcver-2.12a/src/v_sdf.c:6745:16: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((c = getc(f)) != '*') data/gplcver-2.12a/src/v_sdf.c:6750:18: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c2 = getc(f)) == '*') data/gplcver-2.12a/src/v_sdf.c:6761:13: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c = getc(f)) == '/') return(UNDEF); data/gplcver-2.12a/src/v_sdf.c:6790:17: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c = getc(f)) == '"') return(LITSTR); data/gplcver-2.12a/src/v_sdf.c:6795:13: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c = getc(f)) == '"') break; data/gplcver-2.12a/src/v_sdf.c:6827:9: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c1 = getc(f); data/gplcver-2.12a/src/v_sdf.c:6836:9: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c1 = getc(f); data/gplcver-2.12a/src/v_sdf.c:6863:8: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getc(f); data/gplcver-2.12a/src/v_sdf.c:6914:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(verid, ""); data/gplcver-2.12a/src/v_sdf.c:6921:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s1, chp, chp2 - chp); data/gplcver-2.12a/src/v_sdf.c:6932:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(verid) + strlen(s2) >= IDLEN - 2) data/gplcver-2.12a/src/v_sdf.c:6932:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(verid) + strlen(s2) >= IDLEN - 2) data/gplcver-2.12a/src/v_sdf.c:6938:24: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. if (*verid != '\0') strcat(verid, "."); data/gplcver-2.12a/src/v_sdf.c:6947:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(verid) + strlen(s1) >= IDLEN - 2) goto toolong; data/gplcver-2.12a/src/v_sdf.c:6947:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(verid) + strlen(s1) >= IDLEN - 2) goto toolong; data/gplcver-2.12a/src/v_sdf.c:6948:22: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. if (*verid != '\0') strcat(verid, "."); data/gplcver-2.12a/src/v_sdf.c:6998:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s1, sdfid, chp - sdfid); data/gplcver-2.12a/src/v_sdf.c:7022:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(verid) + 2 >= IDLEN + 1) data/gplcver-2.12a/src/v_sdf.c:7055:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s1, s, chp - s); data/gplcver-2.12a/src/v_sdf.c:7117:29: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). do { ctval = sdf_ctab[(c = getc(f)) & 0x7f]; } while (ctval == 1); data/gplcver-2.12a/src/v_sdf.c:7134:26: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ctval = sdf_ctab[(c = getc(f)) & 0x7f]; data/gplcver-2.12a/src/v_sdf.c:7162:29: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). do { ctval = sdf_ctab[(c = getc(f)) & 0x7f]; } while (ctval == 1); data/gplcver-2.12a/src/v_sdf.c:7166:8: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getc(f) & 0x7f; data/gplcver-2.12a/src/v_sdf.c:7170:10: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getc(f); data/gplcver-2.12a/src/v_sdf.c:7172:10: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getc(f); data/gplcver-2.12a/src/v_sdf.c:7207:15: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case COLON: strcpy(__token, ":"); break; data/gplcver-2.12a/src/v_sdf.c:7208:15: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case SHARP: strcpy(__token, "#"); break; data/gplcver-2.12a/src/v_sdf.c:7209:17: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case SDF_DOL: strcpy(__token, "$"); break; data/gplcver-2.12a/src/v_sdf.c:7212:19: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case SDF_BACKQ: strcpy(__token, "`"); break; data/gplcver-2.12a/src/v_sdf.c:7213:19: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case SDF_QUOTE: strcpy(__token, "'"); break; data/gplcver-2.12a/src/v_sdf.c:7215:15: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case COMMA: strcpy(__token, ","); break; data/gplcver-2.12a/src/v_sdf.c:7216:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case LCB: strcpy(__token, "{"); break; data/gplcver-2.12a/src/v_sdf.c:7217:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case RCB: strcpy(__token, "}"); break; data/gplcver-2.12a/src/v_sdf.c:7218:15: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case QUEST: strcpy(__token, "?"); break; data/gplcver-2.12a/src/v_sdf.c:7219:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case LSB: strcpy(__token, "["); break; data/gplcver-2.12a/src/v_sdf.c:7220:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case RSB: strcpy(__token, "]"); break; data/gplcver-2.12a/src/v_sdf.c:7221:14: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case LPAR: strcpy(__token, "("); break; data/gplcver-2.12a/src/v_sdf.c:7222:14: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case RPAR: strcpy(__token, ")"); break; data/gplcver-2.12a/src/v_sdf.c:7223:14: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case PLUS: strcpy(__token, "+"); break; data/gplcver-2.12a/src/v_sdf.c:7224:15: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case MINUS: strcpy(__token, "-"); break; data/gplcver-2.12a/src/v_sdf.c:7225:15: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case TIMES: strcpy(__token, "*"); break; data/gplcver-2.12a/src/v_sdf.c:7226:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case DIV: strcpy(__token, "/"); break; data/gplcver-2.12a/src/v_sdf.c:7227:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case MOD: strcpy(__token, "%"); break; data/gplcver-2.12a/src/v_sdf.c:7228:16: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case BITNOT: strcpy(__token, "~"); break; data/gplcver-2.12a/src/v_sdf.c:7231:19: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case BITREDAND: strcpy(__token, "&"); break; data/gplcver-2.12a/src/v_sdf.c:7233:18: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case BITREDOR: strcpy(__token, "|"); break; data/gplcver-2.12a/src/v_sdf.c:7234:19: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case BITREDXOR: strcpy(__token, "^"); break; data/gplcver-2.12a/src/v_sdf.c:7237:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case NOT: strcpy(__token, "!"); break; data/gplcver-2.12a/src/v_sdf.c:7243:16: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case RELGT: strcpy(__token, ">"); break; data/gplcver-2.12a/src/v_sdf.c:7247:15: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. case RELLT: strcpy(__token, "<"); break; data/gplcver-2.12a/src/v_sim.c:2316:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s1, ""); data/gplcver-2.12a/src/v_sim.c:3579:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s2, ""); data/gplcver-2.12a/src/v_sim.c:3771:2: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(s1, "."); data/gplcver-2.12a/src/v_sim.c:3792:2: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(s1, "."); data/gplcver-2.12a/src/v_sim.c:4805:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s, ""); data/gplcver-2.12a/src/v_sim.c:5308:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __my_free(__cmd_fnam, strlen(__cmd_fnam) + 1); data/gplcver-2.12a/src/v_src.c:1079:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(__portnam, ""); data/gplcver-2.12a/src/v_src.c:3053:6: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s1, ""); data/gplcver-2.12a/src/v_src.c:3054:6: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s2, ""); data/gplcver-2.12a/src/v_src.c:5833:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(npmp->pnam); data/gplcver-2.12a/src/v_src.c:6081:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(s) + 1; data/gplcver-2.12a/src/v_src2.c:4213:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(chp); data/gplcver-2.12a/src/v_src2.c:4684:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(idnam); data/gplcver-2.12a/src/v_src2.c:4850:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __my_free(ndp->ru.qnchp, strlen(ndp->ru.qnchp) + 1); data/gplcver-2.12a/src/v_src2.c:4970:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((int32) strlen(s1) >= RECLEN - 1) s1[RECLEN - 1] = '\0'; data/gplcver-2.12a/src/v_src3.c:819:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(uline, ""); data/gplcver-2.12a/src/v_src3.c:828:18: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. case LPAR: strcat(uline, "("); break; data/gplcver-2.12a/src/v_src3.c:829:18: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. case RPAR: strcat(uline, ")"); break; data/gplcver-2.12a/src/v_src3.c:830:19: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. case QUEST: strcat(uline, "?"); break; data/gplcver-2.12a/src/v_src3.c:831:19: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. case MINUS: strcat(uline, "-"); break; data/gplcver-2.12a/src/v_src3.c:832:19: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. case TIMES: strcat(uline, "*"); break; data/gplcver-2.12a/src/v_src3.c:833:19: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. case COLON: strcat(uline, ":"); break; data/gplcver-2.12a/src/v_src3.c:872:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). utlp->ullen = (word32) strlen(coduline); data/gplcver-2.12a/src/v_src3.c:3015:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s1, ""); data/gplcver-2.12a/src/v_src3.c:3031:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(s1) > 2) data/gplcver-2.12a/src/v_src3.c:3126:27: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (__langstr != NULL) strcpy(__langstr, ""); data/gplcver-2.12a/src/v_src3.c:3140:27: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (__langstr != NULL) strcpy(__langstr, ""); data/gplcver-2.12a/src/v_src3.c:3169:31: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (__langstr != NULL) strcpy(__langstr, ""); data/gplcver-2.12a/src/v_src3.c:3184:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(__langstr) + 11 >= IDLEN) data/gplcver-2.12a/src/v_src3.c:3191:41: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. if (s1[0] != ' ' && s1[0] != '\t') strcat(__langstr, " "); data/gplcver-2.12a/src/v_src3.c:3224:6: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(__langstr, ""); data/gplcver-2.12a/src/v_src3.c:3296:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(match_prefix); data/gplcver-2.12a/src/v_src3.c:3336:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); data/gplcver-2.12a/src/v_src3.c:3402:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((attllen = strlen(attlin)) >= __attrparsestrlen - 1) data/gplcver-2.12a/src/v_src3.c:3938:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(s1); data/gplcver-2.12a/src/v_src3.c:4282:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(libnam, ""); data/gplcver-2.12a/src/v_src3.c:4283:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(celnam, ""); data/gplcver-2.12a/src/v_src3.c:4286:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s1, desnam, chp - desnam); data/gplcver-2.12a/src/v_src3.c:4299:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(s1); data/gplcver-2.12a/src/v_src3.c:4340:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(nam); data/gplcver-2.12a/src/v_src3.c:4371:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(__bind_inam_comptab[ci]) + 1); data/gplcver-2.12a/src/v_src3.c:4377:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s1, chp, chp2 - chp); data/gplcver-2.12a/src/v_src3.c:4389:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(chp); data/gplcver-2.12a/src/v_src3.c:4395:8: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s2, chp, chp2 - chp); data/gplcver-2.12a/src/v_src3.c:4437:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(libnam, ""); data/gplcver-2.12a/src/v_src3.c:4438:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(celnam, ""); data/gplcver-2.12a/src/v_src3.c:4447:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(celnam, nam, chp - nam); data/gplcver-2.12a/src/v_src3.c:4451:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s1, &(nam[1]), chp - nam - 2); data/gplcver-2.12a/src/v_src3.c:4461:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s1, nam, chp - nam); data/gplcver-2.12a/src/v_src3.c:4474:24: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (!chk_libid(s1)) { strcpy(libnam, ""); return(FALSE); } data/gplcver-2.12a/src/v_src3.c:4490:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(libnam, ""); data/gplcver-2.12a/src/v_src3.c:4491:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(celnam, ""); data/gplcver-2.12a/src/v_src3.c:4534:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(libnam, ""); data/gplcver-2.12a/src/v_src3.c:4535:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(celnam, ""); data/gplcver-2.12a/src/v_src3.c:4545:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(celnam, use_spec, chp - use_spec); data/gplcver-2.12a/src/v_src3.c:4549:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s1, &(use_spec[1]), chp - use_spec - 2); data/gplcver-2.12a/src/v_src3.c:4570:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s1, use_spec, chp - use_spec); data/gplcver-2.12a/src/v_src3.c:4585:26: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (!chk_libid(s1)) { strcpy(libnam, ""); return(FALSE); } data/gplcver-2.12a/src/v_src3.c:4592:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s2, s1, chp - s1); data/gplcver-2.12a/src/v_src3.c:4758:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(cp); data/gplcver-2.12a/src/v_src3.c:4863:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str, last, cp - last); data/gplcver-2.12a/src/v_src3.c:4883:12: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str, last, cp - last); data/gplcver-2.12a/src/v_src3.c:4947:22: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (path == NULL) { strcpy(str, "."); cp = str; } data/gplcver-2.12a/src/v_src3.c:5019:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(bpath, ""); data/gplcver-2.12a/src/v_src3.c:5071:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(pat); data/gplcver-2.12a/src/v_src3.c:5383:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). flen = strlen(file); data/gplcver-2.12a/src/v_src3.c:5384:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). plen = strlen(patp); data/gplcver-2.12a/src/v_src3.c:5476:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __my_free(lbep->lbefnam, strlen(lbep->lbefnam) + 1); data/gplcver-2.12a/src/v_src3.c:5512:22: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (path == NULL) { strcpy(str, "."); cp = str; } data/gplcver-2.12a/src/v_src3.c:5824:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). __my_free(__bind_inam_comptab[0], strlen(__bind_inam_comptab[0]) + 1); data/gplcver-2.12a/src/v_src3.c:5993:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(__bind_inam_comptab[__last_bind_comp_ndx]) + 1); data/gplcver-2.12a/src/v_src3.c:6236:4: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(__bind_inam_comptab[__last_bind_comp_ndx]) + 1); data/gplcver-2.12a/src/v_tf.c:1218:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pinfo->node_symbol = __mytf_malloc(strlen(np->nsym->synam) + 1); data/gplcver-2.12a/src/v_tf.c:1448:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(chp); data/gplcver-2.12a/src/v_tf.c:2492:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((slen = strlen(s)) >= IDLEN) return(NULL); data/gplcver-2.12a/src/v_tf.c:2575:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s1, chp2, 3); data/gplcver-2.12a/src/v_tf.c:2593:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(s) != 3) return(FALSE); data/gplcver-2.12a/src/v_tf.c:3612:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(s1); data/gplcver-2.12a/src/v_tf.c:3667:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(s1); data/gplcver-2.12a/src/v_tf.c:4263:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s1, ""); data/gplcver-2.12a/src/v_tf.c:4298:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s1, ""); data/gplcver-2.12a/src/v_tf.c:4338:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s1, ""); data/gplcver-2.12a/src/v_tf.c:4463:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). arglen = strlen(plusarg); data/gplcver-2.12a/src/v_tf.c:4473:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((optlen = strlen(&(chp[1]))) < arglen) continue; data/gplcver-2.12a/src/v_tf.c:4741:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(chp2); data/gplcver-2.12a/src/v_trch.c:2064:6: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s1, ""); data/gplcver-2.12a/src/v_trch.c:2084:6: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s1, ""); data/gplcver-2.12a/src/v_trch.c:2356:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s1, ""); data/gplcver-2.12a/src/v_trch.c:2737:49: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (np->n_stren) strcpy(s2, " strength"); else strcpy(s2, ""); data/gplcver-2.12a/src/v_trch.c:2759:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s1, ""); data/gplcver-2.12a/src/v_trch.c:3736:29: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (!np->n_isavec) strcpy(s2, ""); else sprintf(s2, "[%d]", bi2); data/gplcver-2.12a/src/v_trch.c:3891:16: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (ei == -1) strcpy(s1, ""); else sprintf(s1, " %d:", ei); data/gplcver-2.12a/src/v_trch.c:3968:18: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (ei == -1) strcpy(s1, ""); else sprintf(s1, " %d:", ei); data/gplcver-2.12a/src/v_vpi.c:322:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(ldp->libnam) + 1; data/gplcver-2.12a/src/v_vpi.c:345:6: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s1, "_"); data/gplcver-2.12a/src/v_vpi.c:371:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). suflen = strlen(SO_SUFFIX); data/gplcver-2.12a/src/v_vpi.c:372:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(cp, SO_SUFFIX, suflen) == 0 && strlen(cp) == suflen) data/gplcver-2.12a/src/v_vpi2.c:6670:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(__wrk_vpiget_str, ""); data/gplcver-2.12a/src/v_vpi3.c:2609:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(chp); data/gplcver-2.12a/src/v_vpi3.c:2678:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s, ""); data/gplcver-2.12a/src/v_vpi3.c:4258:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(__wrks1, ""); data/gplcver-2.12a/src/v_vpi3.c:4316:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(__wrks1, ""); data/gplcver-2.12a/src/v_vpi3.c:4442:21: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (lhsbi == -1) strcpy(__wrks1, ""); else sprintf(__wrks1, "[%d]", lhsbi); data/gplcver-2.12a/src/v_vpi3.c:5734:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return(__mc1_fopen(chp, strlen(chp), TRUE)); data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:418:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tfdat.tfname = malloc(strlen(s1) + 1); data/gplcver-2.12a/tests_and_examples/examples.vpi/vacbtst.c:425:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tfdat2.tfname = malloc(strlen(s1) + 1); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg2.c:190:38: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else if (valp->value.scalar == 3) strcpy(s, "x"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg2.c:191:38: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else if (valp->value.scalar == 2) strcpy(s, "z"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg2.c:192:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s, "?"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg2.c:205:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s, ""); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:219:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). varp->fullpthnam = malloc(strlen(s) + 1); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:242:38: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else if (valp->value.scalar == 3) strcpy(s, "x"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:243:38: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else if (valp->value.scalar == 2) strcpy(s, "z"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:244:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(s, "?"); data/gplcver-2.12a/tests_and_examples/examples.vpi/vprtchg3.c:257:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s, ""); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval1.c:186:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). instnam_tab[++last_evh] = malloc(strlen(chp) + 1); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval1.c:211:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). wrkval.value.str = malloc(strlen(valp->value.str) + 1); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval2.c:269:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). instnam_tab[++last_evh] = malloc(strlen(chp) + 1); data/gplcver-2.12a/tests_and_examples/examples.vpi/vsetval2.c:294:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). wrkval.value.str = malloc(strlen(valp->value.str) + 1); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:109:13: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while((c = fgetc(fp)) != EOF) data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:126:21: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while(!isspace(c = fgetc(fp))) data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:217:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (cp = signame + strlen(signame) - 1;cp >= signame && isspace(*cp); cp--) *cp = '\0'; data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:221:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). newsig->ident = (char *) malloc(strlen(ident)+1); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:259:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). newsig->signame = (char *) malloc(strlen(signame)+1); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:574:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size1 = strlen(sval1); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:575:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size2 = strlen(sval2); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:828:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size1 = strlen(sval1); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:829:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vsize1 = strlen(sig1->vector); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:832:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size2 = strlen(sval2); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:833:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vsize2 = strlen(sig2->vector); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:859:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size1 = strlen(sval1); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:860:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vsize1 = strlen(sig1->vector); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:863:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size2 = strlen(sval2); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:864:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vsize2 = strlen(sig2->vector); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:1504:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). file_nam1 = (char*) malloc(strlen(argv[argc-2])+ 1); data/gplcver-2.12a/vcddiff.dir/src/vcddiff.c:1508:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). file_nam2 = (char *) malloc(strlen(argv[argc-1]) + 1); ANALYSIS SUMMARY: Hits = 3189 Lines analyzed = 180689 in approximately 5.08 seconds (35588 lines/second) Physical Source Lines of Code (SLOC) = 126218 Hits@level = [0] 111 [1] 542 [2] 1912 [3] 2 [4] 733 [5] 0 Hits@level+ = [0+] 3300 [1+] 3189 [2+] 2647 [3+] 735 [4+] 733 [5+] 0 Hits/KSLOC@level+ = [0+] 26.1452 [1+] 25.2658 [2+] 20.9717 [3+] 5.82326 [4+] 5.80741 [5+] 0 Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.