Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/alloc.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/alloc.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/alloc_re.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/buffer.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/buffer.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/buffer_0.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/buffer_1.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/buffer_2.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/buffer_get.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/buffer_put.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/buffer_read.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/buffer_write.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/byte.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/byte_chr.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/byte_copy.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/byte_cr.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/byte_diff.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/byte_rchr.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/byte_zero.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/case.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/case_diffb.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/cdb.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/cdb.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/cdb_hash.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/cdb_make.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/cdb_make.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/check-ipsvd-cdb.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/check-tcpsvd.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/check-udpsvd.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/chkshsgr.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/coe.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/coe.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_dfd.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_domain.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_dtda.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_ip.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_ipq.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_mx.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_name.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_nd.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_packet.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_random.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_rcip.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_rcrw.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_resolve.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_sortip.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_transmit.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_txt.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/env.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/env.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/error.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/error.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/error_str.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/fd.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/fd_copy.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/fd_move.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/fifo.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/fifo.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/fmt.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/fmt_uint.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/fmt_uint0.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/fmt_ulong.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/gen_alloc.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/gen_allocdefs.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/iopause.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/ip4.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/ip4_scan.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/ipsvd-cdb.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/ipsvd_check.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/ipsvd_check.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/ipsvd_fmt.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/ipsvd_fmt.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/ipsvd_hostname.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/ipsvd_hostname.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/ipsvd_log.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/ipsvd_log.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/ipsvd_phcc.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/ipsvd_phcc.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/ipsvd_scan.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/ipsvd_scan.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/lock.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/lock_ex.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/lock_exnb.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/ndelay.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/ndelay_off.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/ndelay_on.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/open.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/open_append.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/open_read.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/open_trunc.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/open_write.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/openreadclose.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/openreadclose.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/pathexec.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/pathexec_env.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/pathexec_run.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/prot.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/prot.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/readclose.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/readclose.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/readwrite.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/scan.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/scan_ulong.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/seek.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/seek_set.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/sgetopt.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/sgetopt.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/sig.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/sig.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/sig_block.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/sig_catch.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/sig_pause.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/socket.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/socket_bind.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/socket_conn.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/socket_tcp.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/socket_udp.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/ssl_io.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/ssl_io.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/sslerror_str.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/sslerror_str.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/sslio.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/sslsvd.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/str.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/str_chr.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/str_diff.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/str_len.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/str_start.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/stralloc.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/stralloc_cat.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/stralloc_catb.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/stralloc_cats.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/stralloc_copy.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/stralloc_eady.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/stralloc_opyb.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/stralloc_opys.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/stralloc_pend.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/strerr.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/strerr_die.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/strerr_sys.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/subgetopt.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/subgetopt.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/tai.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/tai_now.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/tai_pack.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/tai_sub.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/tai_unpack.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/taia.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/taia_add.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/taia_approx.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/taia_frac.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/taia_less.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/taia_now.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/taia_pack.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/taia_sub.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/taia_uint.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/tcpsvd.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/test.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/trycpp.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/trydrent.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/tryflock.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/trymkffo.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/trypoll.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/trysgact.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/trysgprm.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/tryshsgr.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/trysocketlib.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/trysysel.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/tryulong32.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/tryulong64.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/trywaitp.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/udpsvd.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/uidgid.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/uidgid.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/uint16.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/uint16_pack.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/uint16_unpack.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/uint32_pack.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/uint32_unpack.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/wait.h Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/wait_nohang.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/wait_pid.c Examining data/ipsvd-1.0.0/ipsvd-1.0.0/src/x86cpuid.c FINAL RESULTS: data/ipsvd-1.0.0/ipsvd-1.0.0/src/sgetopt.c:21:9: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. #define getopt sgetoptmine data/ipsvd-1.0.0/ipsvd-1.0.0/src/sgetopt.c:30:5: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. int getopt(int argc,const char *const *argv,const char *opts) data/ipsvd-1.0.0/ipsvd-1.0.0/src/sgetopt.h:7:9: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. #define getopt sgetoptmine data/ipsvd-1.0.0/ipsvd-1.0.0/src/ssl_io.c:356:11: [3] (misc) chroot: chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22). Make sure the program immediately chdir("/"), closes file descriptors, and drops root privileges, and that all necessary files (and no more!) are in the new root. if (chroot(".") == -1) fatalm("unable to chroot"); data/ipsvd-1.0.0/ipsvd-1.0.0/src/sslio.c:42:16: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((opt =getopt(argc, argv, "u:U:/:C:K:A:cvV")) != opteof) { data/ipsvd-1.0.0/ipsvd-1.0.0/src/tcpsvd.c:273:16: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((opt =getopt(argc, (const char **)argv, data/ipsvd-1.0.0/ipsvd-1.0.0/src/tcpsvd.c:276:16: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((opt =getopt(argc, (const char **)argv, data/ipsvd-1.0.0/ipsvd-1.0.0/src/udpsvd.c:173:16: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((opt =getopt(argc, argv, "vu:l:hpi:x:t:V")) != opteof) { data/ipsvd-1.0.0/ipsvd-1.0.0/src/alloc.c:10:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef union { char irrelevant[ALIGNMENT]; double d; } aligned; data/ipsvd-1.0.0/ipsvd-1.0.0/src/buffer_0.c:11:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer_0_space[BUFFER_INSIZE]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/buffer_1.c:5:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer_1_space[BUFFER_OUTSIZE]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/buffer_2.c:5:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer_2_space[256]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/cdb.c:72:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/cdb.c:89:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/cdb_make.c:54:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/cdb_make.c:75:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/cdb_make.h:20:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bspace[8192]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/cdb_make.h:21:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char final[2048]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/check-ipsvd-cdb.c:10:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/check-ipsvd-cdb.c:11:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char e[256]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/check-tcpsvd.c:7:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[4]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/check-udpsvd.c:12:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[4]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns.h:38:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char localip[4]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns.h:39:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char qtype[2]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_dfd.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[63]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_dfd.c:10:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[255]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_dtda.c:9:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_ip.c:9:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[12]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_mx.c:11:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[12]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_mx.c:12:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pref[2]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_name.c:11:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[12]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_name.c:38:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_name4(stralloc *out,const char ip[4]) data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_name.c:40:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[DNS_NAME4_DOMAIN]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_nd.c:5:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void dns_name4_domain(char name[DNS_NAME4_DOMAIN],const char ip[4]) data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_nd.c:5:57: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void dns_name4_domain(char name[DNS_NAME4_DOMAIN],const char ip[4]) data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_packet.c:42:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[255]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_random.c:33:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void dns_random_init(const char data[128]) data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_random.c:37:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tpack[16]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_rcip.c:10:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int init(char ip[64]) data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_rcip.c:65:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ip[64]; /* defined if ok */ data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_rcip.c:67:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_resolvconfip(char s[64]) data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_rcrw.c:13:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host[256]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_resolve.c:8:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_resolve(const char *q,const char qtype[2]) data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_resolve.c:8:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_resolve(const char *q,const char qtype[2]) data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_resolve.c:12:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char servers[64]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_sortip.c:10:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[4]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_transmit.c:13:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[12]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_transmit.c:22:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[12]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_transmit.c:34:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[12]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_transmit.c:196:53: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_transmit_start(struct dns_transmit *d,const char servers[64],int flagrecursive,const char *q,const char qtype[2],const char localip[4]) data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_transmit.c:196:94: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_transmit_start(struct dns_transmit *d,const char servers[64],int flagrecursive,const char *q,const char qtype[2],const char localip[4]) data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_transmit.c:196:108: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_transmit_start(struct dns_transmit *d,const char servers[64],int flagrecursive,const char *q,const char qtype[2],const char localip[4]) data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_transmit.c:196:128: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_transmit_start(struct dns_transmit *d,const char servers[64],int flagrecursive,const char *q,const char qtype[2],const char localip[4]) data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_transmit.c:243:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char udpbuf[513]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_txt.c:9:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[12]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/ip4_scan.c:4:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned int ip4_scan(const char *s,char ip[4]) data/ipsvd-1.0.0/ipsvd-1.0.0/src/ip4_scan.c:4:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned int ip4_scan(const char *s,char ip[4]) data/ipsvd-1.0.0/ipsvd-1.0.0/src/ipsvd_check.c:93:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[IP4_FMT]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/ipsvd_fmt.c:5:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned int ipsvd_fmt_ip(char *s, char ip[4]) { data/ipsvd-1.0.0/ipsvd-1.0.0/src/ipsvd_fmt.c:5:36: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned int ipsvd_fmt_ip(char *s, char ip[4]) { data/ipsvd-1.0.0/ipsvd-1.0.0/src/ipsvd_fmt.c:19:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned int ipsvd_fmt_port(char *s, char port[2]) { data/ipsvd-1.0.0/ipsvd-1.0.0/src/ipsvd_fmt.c:19:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned int ipsvd_fmt_port(char *s, char port[2]) { data/ipsvd-1.0.0/ipsvd-1.0.0/src/ipsvd_fmt.h:4:34: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern unsigned int ipsvd_fmt_ip(char *s, char ip[4]); data/ipsvd-1.0.0/ipsvd-1.0.0/src/ipsvd_fmt.h:4:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern unsigned int ipsvd_fmt_ip(char *s, char ip[4]); data/ipsvd-1.0.0/ipsvd-1.0.0/src/ipsvd_fmt.h:5:36: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern unsigned int ipsvd_fmt_port(char *s, char port[2]); data/ipsvd-1.0.0/ipsvd-1.0.0/src/ipsvd_fmt.h:5:45: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern unsigned int ipsvd_fmt_port(char *s, char port[2]); data/ipsvd-1.0.0/ipsvd-1.0.0/src/ipsvd_phcc.c:5:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[4]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/open_append.c:8:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). { return open(fn,O_WRONLY | O_NDELAY | O_APPEND | O_CREAT,0600); } data/ipsvd-1.0.0/ipsvd-1.0.0/src/open_read.c:8:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). { return open(fn,O_RDONLY | O_NDELAY); } data/ipsvd-1.0.0/ipsvd-1.0.0/src/open_trunc.c:8:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). { return open(fn,O_WRONLY | O_NDELAY | O_TRUNC | O_CREAT,0644); } data/ipsvd-1.0.0/ipsvd-1.0.0/src/open_write.c:8:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). { return open(fn,O_WRONLY | O_NDELAY); } data/ipsvd-1.0.0/ipsvd-1.0.0/src/sgetopt.c:43:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chp[2]; chp[0] = optproblem; chp[1] = '\n'; data/ipsvd-1.0.0/ipsvd-1.0.0/src/socket_bind.c:8:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int socket_bind4(int s,char ip[4],uint16 port) data/ipsvd-1.0.0/ipsvd-1.0.0/src/socket_bind.c:20:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int socket_bind4_reuse(int s,char ip[4],uint16 port) data/ipsvd-1.0.0/ipsvd-1.0.0/src/socket_conn.c:9:33: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int socket_connect4(int s,const char ip[4],uint16 port) data/ipsvd-1.0.0/ipsvd-1.0.0/src/ssl_io.c:31:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char id[FMT_ULONG]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/ssl_io.c:32:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char ul[FMT_ULONG]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/ssl_io.h:6:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id[FMT_ULONG]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/ssl_io.h:7:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ul[FMT_ULONG]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/tcpsvd.c:62:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local_ip[IP4_FMT]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/tcpsvd.c:65:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char remote_ip[IP4_FMT]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/tcpsvd.c:66:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char remote_port[FMT_ULONG]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/tcpsvd.c:72:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char seed[128]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/tcpsvd.c:73:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bufnum[FMT_ULONG]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/tcpsvd.c:155:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *args[4]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/test.c:6:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[4]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/trypoll.c:11:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). x.fd = open("trypoll.c",O_RDONLY); data/ipsvd-1.0.0/ipsvd-1.0.0/src/udpsvd.c:46:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local_ip[IP4_FMT]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/udpsvd.c:49:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char remote_ip[IP4_FMT]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/udpsvd.c:50:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char remote_port[FMT_ULONG]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/udpsvd.c:53:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char seed[128]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/udpsvd.c:56:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bufnum[FMT_ULONG]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/udpsvd.c:92:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *args[4]; data/ipsvd-1.0.0/ipsvd-1.0.0/src/uint16_pack.c:3:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint16_pack(char s[2],uint16 u) data/ipsvd-1.0.0/ipsvd-1.0.0/src/uint16_pack.c:9:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint16_pack_big(char s[2],uint16 u) data/ipsvd-1.0.0/ipsvd-1.0.0/src/uint16_unpack.c:3:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint16_unpack(const char s[2],uint16 *u) data/ipsvd-1.0.0/ipsvd-1.0.0/src/uint16_unpack.c:14:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint16_unpack_big(const char s[2],uint16 *u) data/ipsvd-1.0.0/ipsvd-1.0.0/src/uint32_pack.c:3:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint32_pack(char s[4],uint32 u) data/ipsvd-1.0.0/ipsvd-1.0.0/src/uint32_pack.c:13:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint32_pack_big(char s[4],uint32 u) data/ipsvd-1.0.0/ipsvd-1.0.0/src/uint32_unpack.c:3:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint32_unpack(const char s[4],uint32 *u) data/ipsvd-1.0.0/ipsvd-1.0.0/src/uint32_unpack.c:18:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint32_unpack_big(const char s[4],uint32 *u) data/ipsvd-1.0.0/ipsvd-1.0.0/src/buffer_read.c:8:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return read(fd,buf,len); data/ipsvd-1.0.0/ipsvd-1.0.0/src/cdb.c:55:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(c->fd,buf,len); data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_transmit.c:320:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(fd,&ch,1); data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_transmit.c:333:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(fd,&ch,1); data/ipsvd-1.0.0/ipsvd-1.0.0/src/dns_transmit.c:351:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(fd,d->packet + d->pos,d->packetlen - d->pos); data/ipsvd-1.0.0/ipsvd-1.0.0/src/readclose.c:12:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(fd,sa->s + sa->len,bufsize); data/ipsvd-1.0.0/ipsvd-1.0.0/src/socket_conn.c:29:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(s,&ch,1); /* sets errno */ data/ipsvd-1.0.0/ipsvd-1.0.0/src/ssl_io.c:159:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((len =read(encpipe[0], encinbuf.s, encin.size)) < 0) data/ipsvd-1.0.0/ipsvd-1.0.0/src/ssl_io.c:189:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((len =read(fdstdin, decin.end, len)) < 0) ANALYSIS SUMMARY: Hits = 110 Lines analyzed = 6944 in approximately 0.37 seconds (18713 lines/second) Physical Source Lines of Code (SLOC) = 5776 Hits@level = [0] 7 [1] 9 [2] 93 [3] 8 [4] 0 [5] 0 Hits@level+ = [0+] 117 [1+] 110 [2+] 101 [3+] 8 [4+] 0 [5+] 0 Hits/KSLOC@level+ = [0+] 20.2562 [1+] 19.0443 [2+] 17.4861 [3+] 1.38504 [4+] 0 [5+] 0 Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.