Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c Examining data/nagios-nrpe-4.0.3/include/acl.h Examining data/nagios-nrpe-4.0.3/include/nrpe.h Examining data/nagios-nrpe-4.0.3/include/utils.h Examining data/nagios-nrpe-4.0.3/include/dh.h Examining data/nagios-nrpe-4.0.3/src/acl.c Examining data/nagios-nrpe-4.0.3/src/check_nrpe.c Examining data/nagios-nrpe-4.0.3/src/nrpe.c Examining data/nagios-nrpe-4.0.3/src/snprintf.c Examining data/nagios-nrpe-4.0.3/src/utils.c FINAL RESULTS: data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:34:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(state,argv[1]); data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:35:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(state_type,argv[2]); data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:37:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(host_name,argv[4]); data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:51:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(temp_input,input_buffer); data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:52:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(temp_string,strtok(temp_input,"=")); data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:53:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ent_type,strtok(temp_string,"[")); data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:56:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(test_host,strtok(NULL,"]")); data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:60:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(service_name,strtok(NULL,";")); data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:65:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(check_name,strtok(temp_var,"!")); data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:92:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(temp_input,input_buffer); data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:93:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(temp_string,strtok(temp_input,"=")); data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:94:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ent_type,strtok(temp_string,"[")); data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:97:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(test_host,strtok(NULL,"]")); data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:101:15: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(service_name,strtok(NULL,";")); data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:106:15: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(check_name,strtok(temp_var,"!")); data/nagios-nrpe-4.0.3/src/acl.c:467:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dns_acl_curr->domain, domain); data/nagios-nrpe-4.0.3/src/check_nrpe.c:1236:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(&v3_send_packet->buffer[0], query); data/nagios-nrpe-4.0.3/src/nrpe.c:1670:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(remote_host, ipstr); data/nagios-nrpe-4.0.3/src/nrpe.c:1818:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(send_buff, buffer); data/nagios-nrpe-4.0.3/src/nrpe.c:1835:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(send_buff, buffer); data/nagios-nrpe-4.0.3/src/nrpe.c:1929:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(&v3_send_packet->buffer[0], send_buff); data/nagios-nrpe-4.0.3/src/nrpe.c:2378:8: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. fp = popen(command, "r"); /* run the command */ data/nagios-nrpe-4.0.3/src/snprintf.c:1198:9: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define vsnprintf smb_vsnprintf data/nagios-nrpe-4.0.3/src/snprintf.c:1214:8: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. ret = vsnprintf(str, count, fmt, ap); data/nagios-nrpe-4.0.3/src/snprintf.c:1218:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define snprintf smb_snprintf data/nagios-nrpe-4.0.3/src/snprintf.c:1231:8: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. ret = vsnprintf(NULL, 0, format, ap2); data/nagios-nrpe-4.0.3/src/snprintf.c:1239:8: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. ret = vsnprintf(*ptr, ret+1, format, ap2); data/nagios-nrpe-4.0.3/src/snprintf.c:1263:6: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. int sprintf(char *str,const char *fmt,...); data/nagios-nrpe-4.0.3/src/snprintf.c:1332:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. l1 = snprintf(NULL, 0, fp_fmt[x], fp_nums[y]); data/nagios-nrpe-4.0.3/src/snprintf.c:1333:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. l2 = snprintf(buf1, sizeof(buf1), fp_fmt[x], fp_nums[y]); data/nagios-nrpe-4.0.3/src/snprintf.c:1334:4: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf (buf2, fp_fmt[x], fp_nums[y]); data/nagios-nrpe-4.0.3/src/snprintf.c:1348:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. l1 = snprintf(NULL, 0, int_fmt[x], int_nums[y]); data/nagios-nrpe-4.0.3/src/snprintf.c:1349:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. l2 = snprintf(buf1, sizeof(buf1), int_fmt[x], int_nums[y]); data/nagios-nrpe-4.0.3/src/snprintf.c:1350:4: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf (buf2, int_fmt[x], int_nums[y]); data/nagios-nrpe-4.0.3/src/snprintf.c:1364:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. l1 = snprintf(NULL, 0, str_fmt[x], str_vals[y]); data/nagios-nrpe-4.0.3/src/snprintf.c:1365:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. l2 = snprintf(buf1, sizeof(buf1), str_fmt[x], str_vals[y]); data/nagios-nrpe-4.0.3/src/snprintf.c:1366:4: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf (buf2, str_fmt[x], str_vals[y]); data/nagios-nrpe-4.0.3/src/check_nrpe.c:264:7: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. c = getopt_long(argc, argv, optchars, long_options, &option_index); data/nagios-nrpe-4.0.3/src/check_nrpe.c:266:7: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. c = getopt(argc, argv, optchars); data/nagios-nrpe-4.0.3/src/nrpe.c:302:4: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(NULL)); data/nagios-nrpe-4.0.3/src/nrpe.c:2975:7: [3] (buffer) getopt_long: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. c = getopt_long(argc, argv, optchars, long_options, &option_index); data/nagios-nrpe-4.0.3/src/nrpe.c:2977:7: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. c = getopt(argc, argv, optchars); data/nagios-nrpe-4.0.3/src/utils.c:126:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(seed); data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:13:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char check_name[MAX_CHARS]; data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:14:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ent_type[MAX_CHARS]; data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:15:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char input_buffer[MAX_CHARS]; data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:16:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host_name[MAX_CHARS]; data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:17:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char service_name[MAX_CHARS]; data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:18:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char state[MAX_CHARS]; data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:19:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char state_type[MAX_CHARS]; data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:20:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_input[MAX_CHARS]; data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:21:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_string[MAX_CHARS]; data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:22:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char test_host[MAX_CHARS]; data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:36:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). attempt=atoi(argv[3]); data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:41:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). services_fp=fopen(SERVICES_FILE,"r"); data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:42:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). command_fp=fopen(COMMAND_FILE,"a"); data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:82:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). services_fp=fopen(SERVICES_FILE,"r"); data/nagios-nrpe-4.0.3/contrib/nrpe_check_control.c:83:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). command_fp=fopen(COMMAND_FILE,"a"); data/nagios-nrpe-4.0.3/include/acl.h:55:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char domain[255]; data/nagios-nrpe-4.0.3/src/acl.c:314:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). maskval = atoi(mask_part); data/nagios-nrpe-4.0.3/src/acl.c:569:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char formattedStr[INET6_ADDRSTRLEN]; data/nagios-nrpe-4.0.3/src/acl.c:577:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *) &addr6, ai->ai_addr, sizeof(addr6)); data/nagios-nrpe-4.0.3/src/check_nrpe.c:57:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timeout_txt[10]; data/nagios-nrpe-4.0.3/src/check_nrpe.c:62:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rem_host[MAX_HOST_ADDRESS_LENGTH]; data/nagios-nrpe-4.0.3/src/check_nrpe.c:63:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char query[MAX_INPUT_BUFFER] = ""; data/nagios-nrpe-4.0.3/src/check_nrpe.c:106:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cipher_list[MAX_FILENAME_LENGTH]; data/nagios-nrpe-4.0.3/src/check_nrpe.c:213:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char optchars[MAX_INPUT_BUFFER]; data/nagios-nrpe-4.0.3/src/check_nrpe.c:314:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server_port = atoi(optarg); data/nagios-nrpe-4.0.3/src/check_nrpe.c:324:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). payload_size = atoi(optarg); data/nagios-nrpe-4.0.3/src/check_nrpe.c:412:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sslprm.allowDH = atoi(optarg); data/nagios-nrpe-4.0.3/src/check_nrpe.c:576:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((f = fopen(fname, "r")) == NULL) { data/nagios-nrpe-4.0.3/src/check_nrpe.c:685:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). else if (atoi(timeout_val) > 0) data/nagios-nrpe-4.0.3/src/check_nrpe.c:686:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). return atoi(timeout_val); data/nagios-nrpe-4.0.3/src/check_nrpe.c:1007:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(sslprm.cipher_list, ":!ADH"); data/nagios-nrpe-4.0.3/src/check_nrpe.c:1153:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char peer_cn[256], buffer[2048]; data/nagios-nrpe-4.0.3/src/check_nrpe.c:1455:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*v2_pkt, &packet, common_size); data/nagios-nrpe-4.0.3/src/check_nrpe.c:1486:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*v3_pkt, &packet, common_size); data/nagios-nrpe-4.0.3/src/check_nrpe.c:1545:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*v2_pkt, &packet, common_size); data/nagios-nrpe-4.0.3/src/check_nrpe.c:1582:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*v3_pkt, &packet, common_size); data/nagios-nrpe-4.0.3/src/check_nrpe.c:1626:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[256], issuer[256]; data/nagios-nrpe-4.0.3/src/check_nrpe.c:1686:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/nagios-nrpe-4.0.3/src/nrpe.c:84:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char remote_host[MAX_HOST_ADDRESS_LENGTH]; data/nagios-nrpe-4.0.3/src/nrpe.c:85:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *macro_argv[MAX_COMMAND_ARGUMENTS]; data/nagios-nrpe-4.0.3/src/nrpe.c:86:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char config_file[MAX_INPUT_BUFFER] = "nrpe.cfg"; data/nagios-nrpe-4.0.3/src/nrpe.c:87:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char server_address[NI_MAXHOST] = ""; data/nagios-nrpe-4.0.3/src/nrpe.c:144:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cipher_list[MAX_FILENAME_LENGTH]; data/nagios-nrpe-4.0.3/src/nrpe.c:170:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_INPUT_BUFFER]; data/nagios-nrpe-4.0.3/src/nrpe.c:265:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char seedfile[FILENAME_MAX]; data/nagios-nrpe-4.0.3/src/nrpe.c:266:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errstr[120] = { "" }; data/nagios-nrpe-4.0.3/src/nrpe.c:462:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(sslprm.cipher_list, ":!ADH"); data/nagios-nrpe-4.0.3/src/nrpe.c:627:2: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). open("/dev/null", O_WRONLY); data/nagios-nrpe-4.0.3/src/nrpe.c:690:2: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). open("/dev/null", O_RDONLY); /* redirect standard descriptors to /dev/null */ data/nagios-nrpe-4.0.3/src/nrpe.c:691:2: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). open("/dev/null", O_WRONLY); data/nagios-nrpe-4.0.3/src/nrpe.c:692:2: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). open("/dev/null", O_WRONLY); data/nagios-nrpe-4.0.3/src/nrpe.c:746:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[256], issuer[256]; data/nagios-nrpe-4.0.3/src/nrpe.c:835:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char config_file[MAX_FILENAME_LENGTH]; data/nagios-nrpe-4.0.3/src/nrpe.c:836:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char input_buffer[MAX_INPUT_BUFFER]; data/nagios-nrpe-4.0.3/src/nrpe.c:845:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(filename, "r"); /* open the config file for reading */ data/nagios-nrpe-4.0.3/src/nrpe.c:912:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). max_commands = atoi(varvalue); data/nagios-nrpe-4.0.3/src/nrpe.c:919:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server_port = atoi(varvalue); data/nagios-nrpe-4.0.3/src/nrpe.c:951:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). debug = atoi(varvalue); data/nagios-nrpe-4.0.3/src/nrpe.c:964:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). allow_arguments = (atoi(varvalue) == 1) ? TRUE : FALSE; data/nagios-nrpe-4.0.3/src/nrpe.c:967:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). disable_syslog = (atoi(varvalue) == 1) ? TRUE : FALSE; data/nagios-nrpe-4.0.3/src/nrpe.c:970:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). allow_bash_cmd_subst = (atoi(varvalue) == 1) ? TRUE : FALSE; data/nagios-nrpe-4.0.3/src/nrpe.c:973:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). command_timeout = atoi(varvalue); data/nagios-nrpe-4.0.3/src/nrpe.c:981:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). connection_timeout = atoi(varvalue); data/nagios-nrpe-4.0.3/src/nrpe.c:990:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ssl_shutdown_timeout = atoi(varvalue); data/nagios-nrpe-4.0.3/src/nrpe.c:999:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). allow_weak_random_seed = (atoi(varvalue) == 1) ? TRUE : FALSE; data/nagios-nrpe-4.0.3/src/nrpe.c:1005:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). listen_queue_size = atoi(varvalue); data/nagios-nrpe-4.0.3/src/nrpe.c:1047:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sslprm.allowDH = atoi(varvalue); data/nagios-nrpe-4.0.3/src/nrpe.c:1072:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sslprm.client_certs = atoi(varvalue); data/nagios-nrpe-4.0.3/src/nrpe.c:1126:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char config_file[MAX_FILENAME_LENGTH]; data/nagios-nrpe-4.0.3/src/nrpe.c:1294:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ntop[NI_MAXHOST], strport[NI_MAXSERV]; data/nagios-nrpe-4.0.3/src/nrpe.c:1468:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addrstr[100]; data/nagios-nrpe-4.0.3/src/nrpe.c:1588:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ipstr[INET6_ADDRSTRLEN]; data/nagios-nrpe-4.0.3/src/nrpe.c:1720:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_INPUT_BUFFER], *send_buff = NULL, *send_pkt; data/nagios-nrpe-4.0.3/src/nrpe.c:1721:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char raw_command[MAX_INPUT_BUFFER]; data/nagios-nrpe-4.0.3/src/nrpe.c:1722:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char processed_command[MAX_INPUT_BUFFER]; data/nagios-nrpe-4.0.3/src/nrpe.c:1741:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). errfp = fopen("/tmp/err.log", "a"); data/nagios-nrpe-4.0.3/src/nrpe.c:1863:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(send_buff, "NRPE: Command timed out after %d seconds\n", data/nagios-nrpe-4.0.3/src/nrpe.c:1867:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(send_buff, "NRPE: Unable to read output\n"); data/nagios-nrpe-4.0.3/src/nrpe.c:1997:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_INPUT_BUFFER]; data/nagios-nrpe-4.0.3/src/nrpe.c:2048:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). errfp = fopen("/tmp/err.log", "a"); data/nagios-nrpe-4.0.3/src/nrpe.c:2151:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*v3_pkt, v2_pkt, common_size); data/nagios-nrpe-4.0.3/src/nrpe.c:2246:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*v3_pkt, v2_pkt, common_size); data/nagios-nrpe-4.0.3/src/nrpe.c:2300:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_INPUT_BUFFER]; data/nagios-nrpe-4.0.3/src/nrpe.c:2523:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). gid = (gid_t) atoi(group); data/nagios-nrpe-4.0.3/src/nrpe.c:2547:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). uid = (uid_t) atoi(user); data/nagios-nrpe-4.0.3/src/nrpe.c:2580:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pbuf[16]; data/nagios-nrpe-4.0.3/src/nrpe.c:2587:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(pid_file, O_RDONLY)) >= 0) { data/nagios-nrpe-4.0.3/src/nrpe.c:2594:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). pid = (pid_t) atoi(pbuf); data/nagios-nrpe-4.0.3/src/nrpe.c:2609:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(pid_file, O_WRONLY | O_CREAT, 0644)) >= 0) { data/nagios-nrpe-4.0.3/src/nrpe.c:2610:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(pbuf, "%d\n", (int)getpid()); data/nagios-nrpe-4.0.3/src/nrpe.c:2908:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). arg_index = atoi(temp_buffer + 3); data/nagios-nrpe-4.0.3/src/nrpe.c:2945:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char optchars[MAX_INPUT_BUFFER]; data/nagios-nrpe-4.0.3/src/snprintf.c:682:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(buffer[currlen]), &(base[cnk->start]), len); data/nagios-nrpe-4.0.3/src/snprintf.c:807:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char convert[20]; data/nagios-nrpe-4.0.3/src/snprintf.c:960:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char iconvert[311]; data/nagios-nrpe-4.0.3/src/snprintf.c:961:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fconvert[311]; data/nagios-nrpe-4.0.3/src/snprintf.c:1267:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[1024]; data/nagios-nrpe-4.0.3/src/snprintf.c:1268:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[1024]; data/nagios-nrpe-4.0.3/src/snprintf.c:1395:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. l2 = sprintf(buf2, "%4$*1$d %2$s %3$*1$.*1$f", 3, "pos test", 12.3456, 9); data/nagios-nrpe-4.0.3/src/snprintf.c:1405:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. l2 = sprintf(buf2, "%4$*4$d %2$s %3$*4$.*4$f", 3, "pos test", 12.3456, 9); data/nagios-nrpe-4.0.3/src/snprintf.c:1415:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. l2 = sprintf(buf2, "%lld", (LLONG)1234567890); data/nagios-nrpe-4.0.3/src/snprintf.c:1425:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. l2 = sprintf(buf2, "%Lf", (LDOUBLE)890.1234567890123); data/nagios-nrpe-4.0.3/src/snprintf.c:1442:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf2, "%1.1f", r); data/nagios-nrpe-4.0.3/src/utils.c:117:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen("/dev/urandom", "r"); data/nagios-nrpe-4.0.3/src/utils.c:143:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ntop[NI_MAXHOST], strport[NI_MAXSERV]; data/nagios-nrpe-4.0.3/src/utils.c:180:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hostaddr, ai->ai_addr, ai->ai_addrlen); data/nagios-nrpe-4.0.3/src/utils.c:242:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strport[NI_MAXSERV]; data/nagios-nrpe-4.0.3/src/utils.c:502:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fh = open(log_file, flags, S_IRUSR|S_IWUSR|S_IRGRP|S_IROTH)) == -1) { data/nagios-nrpe-4.0.3/src/acl.c:144:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(ipv4); data/nagios-nrpe-4.0.3/src/acl.c:403:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(domain); data/nagios-nrpe-4.0.3/src/acl.c:641:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). trimmed_tok = malloc(sizeof(char) * (strlen(tok) + 1)); data/nagios-nrpe-4.0.3/src/acl.c:645:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(trimmed_tok) > 0) { data/nagios-nrpe-4.0.3/src/check_nrpe.c:155:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(sslprm.cipher_list, "ALL:!MD5:@STRENGTH:@SECLEVEL=0", MAX_FILENAME_LENGTH - 1); data/nagios-nrpe-4.0.3/src/check_nrpe.c:157:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(sslprm.cipher_list, "ALL:!MD5:@STRENGTH", MAX_FILENAME_LENGTH - 1); data/nagios-nrpe-4.0.3/src/check_nrpe.c:482:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(sslprm.cipher_list, optarg, sizeof(sslprm.cipher_list) - 1); data/nagios-nrpe-4.0.3/src/check_nrpe.c:526:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = sizeof(query) - strlen(query) - 2; data/nagios-nrpe-4.0.3/src/check_nrpe.c:530:4: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(query, "!"); data/nagios-nrpe-4.0.3/src/check_nrpe.c:531:4: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(query, argv[c], i); data/nagios-nrpe-4.0.3/src/check_nrpe.c:1006:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(sslprm.cipher_list) < sizeof(sslprm.cipher_list) - 6) { data/nagios-nrpe-4.0.3/src/check_nrpe.c:1015:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(sslprm.cipher_list, "ADH@SECLEVEL=0", MAX_FILENAME_LENGTH - 1); data/nagios-nrpe-4.0.3/src/check_nrpe.c:1017:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(sslprm.cipher_list, "ADH", MAX_FILENAME_LENGTH - 1); data/nagios-nrpe-4.0.3/src/check_nrpe.c:1076:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(rem_host, "Unknown", sizeof(rem_host)); data/nagios-nrpe-4.0.3/src/check_nrpe.c:1205:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(&v2_send_packet->buffer[0], query, payload_size); data/nagios-nrpe-4.0.3/src/check_nrpe.c:1208:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(&v2_send_packet->buffer[0], query, MAX_PACKETBUFFER_LENGTH); data/nagios-nrpe-4.0.3/src/check_nrpe.c:1219:65: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pkt_size = (sizeof(v3_packet) - NRPE_V4_PACKET_SIZE_OFFSET) + strlen(query) + 1; data/nagios-nrpe-4.0.3/src/check_nrpe.c:1221:66: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pkt_size = (sizeof(v3_packet) - NRPE_V3_PACKET_SIZE_OFFSET) + strlen(query) + 1; data/nagios-nrpe-4.0.3/src/nrpe.c:183:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buffer, config_file, sizeof(buffer)); data/nagios-nrpe-4.0.3/src/nrpe.c:187:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(config_file, ""); data/nagios-nrpe-4.0.3/src/nrpe.c:194:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. strncat(config_file, "/", sizeof(config_file) - 2); data/nagios-nrpe-4.0.3/src/nrpe.c:198:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(config_file, buffer, sizeof(config_file) - strlen(config_file) - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:198:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncat(config_file, buffer, sizeof(config_file) - strlen(config_file) - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:461:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(sslprm.cipher_list) < sizeof(sslprm.cipher_list) - 6) data/nagios-nrpe-4.0.3/src/nrpe.c:467:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(sslprm.cipher_list, "ADH@SECLEVEL=0", MAX_FILENAME_LENGTH - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:469:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(sslprm.cipher_list, "ADH", MAX_FILENAME_LENGTH - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:781:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = strlen(input); data/nagios-nrpe-4.0.3/src/nrpe.c:862:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(input_line); data/nagios-nrpe-4.0.3/src/nrpe.c:892:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(config_file, varvalue, sizeof(config_file) - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:896:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (config_file[strlen(config_file) - 1] == '/') data/nagios-nrpe-4.0.3/src/nrpe.c:897:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). config_file[strlen(config_file) - 1] = '\x0'; data/nagios-nrpe-4.0.3/src/nrpe.c:931:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(server_address, varvalue, sizeof(server_address) - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:1059:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(sslprm.cipher_list, varvalue, sizeof(sslprm.cipher_list) - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:1158:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). x = strlen(dirfile->d_name); data/nagios-nrpe-4.0.3/src/nrpe.c:1614:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(remote_host, inet_ntoa(nptr->sin_addr), sizeof(remote_host) - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:1622:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(ipstr, "Unknown", sizeof(ipstr)); data/nagios-nrpe-4.0.3/src/nrpe.c:1624:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(remote_host, ipstr, sizeof(remote_host) - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:1843:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(raw_command, temp_command->command_line, sizeof(raw_command) - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:1854:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(buffer, ""); data/nagios-nrpe-4.0.3/src/nrpe.c:1889:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pkt_size = strlen(send_buff); data/nagios-nrpe-4.0.3/src/nrpe.c:1891:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (send_buff[strlen(send_buff) - 1] == '\n') data/nagios-nrpe-4.0.3/src/nrpe.c:1892:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). send_buff[strlen(send_buff) - 1] = '\x0'; data/nagios-nrpe-4.0.3/src/nrpe.c:1907:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(&send_packet.buffer[0], send_buff, MAX_PACKETBUFFER_LENGTH); data/nagios-nrpe-4.0.3/src/nrpe.c:1917:65: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pkt_size = (sizeof(v3_packet) - NRPE_V4_PACKET_SIZE_OFFSET) + strlen(send_buff) + 1; data/nagios-nrpe-4.0.3/src/nrpe.c:1919:66: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pkt_size = (sizeof(v3_packet) - NRPE_V3_PACKET_SIZE_OFFSET) + strlen(send_buff) + 1; data/nagios-nrpe-4.0.3/src/nrpe.c:1928:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). v3_send_packet->buffer_length = htonl(strlen(send_buff) + 1); data/nagios-nrpe-4.0.3/src/nrpe.c:2343:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(*output, buffer, output_size - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:2382:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buffer, "NRPE: Call to popen() failed\n", sizeof(buffer) - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:2386:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (write(fd[1], buffer, strlen(buffer) + 1) == -1) data/nagios-nrpe-4.0.3/src/nrpe.c:2447:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). bytes_read = read(fd[0], buffer, sizeof(buffer) - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:2457:5: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(*output, buffer, output_size - tot_bytes - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:2513:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strspn(group, "0123456789") < strlen(group)) { data/nagios-nrpe-4.0.3/src/nrpe.c:2537:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strspn(user, "0123456789") < strlen(user)) { data/nagios-nrpe-4.0.3/src/nrpe.c:2589:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). result = read(fd, pbuf, (sizeof pbuf) - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:2612:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (write(fd, pbuf, strlen(pbuf)) == -1) data/nagios-nrpe-4.0.3/src/nrpe.c:2872:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (result != strlen(str)) data/nagios-nrpe-4.0.3/src/nrpe.c:2886:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(output_buffer, ""); data/nagios-nrpe-4.0.3/src/nrpe.c:2896:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(output_buffer) + strlen(temp_buffer) < buffer_length - 1) { data/nagios-nrpe-4.0.3/src/nrpe.c:2896:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(output_buffer) + strlen(temp_buffer) < buffer_length - 1) { data/nagios-nrpe-4.0.3/src/nrpe.c:2897:5: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(output_buffer, temp_buffer, buffer_length - strlen(output_buffer) - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:2897:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncat(output_buffer, temp_buffer, buffer_length - strlen(output_buffer) - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:2904:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(output_buffer) + strlen(temp_buffer) < buffer_length - 1) { data/nagios-nrpe-4.0.3/src/nrpe.c:2904:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(output_buffer) + strlen(temp_buffer) < buffer_length - 1) { data/nagios-nrpe-4.0.3/src/nrpe.c:2914:6: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. strncat(output_buffer, "$", buffer_length - strlen(output_buffer) - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:2914:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncat(output_buffer, "$", buffer_length - strlen(output_buffer) - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:2918:6: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. strncat(output_buffer, "$", buffer_length - strlen(output_buffer) - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:2918:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncat(output_buffer, "$", buffer_length - strlen(output_buffer) - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:2920:6: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(output_buffer, temp_buffer, data/nagios-nrpe-4.0.3/src/nrpe.c:2921:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buffer_length - strlen(output_buffer) - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:2923:6: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. strncat(output_buffer, "$", buffer_length - strlen(output_buffer) - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:2923:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncat(output_buffer, "$", buffer_length - strlen(output_buffer) - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:2929:6: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(output_buffer, (selected_macro == NULL) ? "" : selected_macro, data/nagios-nrpe-4.0.3/src/nrpe.c:2930:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buffer_length - strlen(output_buffer) - 1); data/nagios-nrpe-4.0.3/src/nrpe.c:3000:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(config_file, optarg, sizeof(config_file)); data/nagios-nrpe-4.0.3/src/snprintf.c:711:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). max = strlen(cnk->strvalue); data/nagios-nrpe-4.0.3/src/utils.c:119:10: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). seed = fgetc(fp); data/nagios-nrpe-4.0.3/src/utils.c:282:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(keep); data/nagios-nrpe-4.0.3/src/utils.c:310:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(var, environ[i], var_sz); data/nagios-nrpe-4.0.3/src/utils.c:314:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strncmp(var, kept[j], strlen(kept[j]))) data/nagios-nrpe-4.0.3/src/utils.c:367:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (x = strlen(buffer); x >= 1; x--) { ANALYSIS SUMMARY: Hits = 231 Lines analyzed = 7893 in approximately 0.24 seconds (32688 lines/second) Physical Source Lines of Code (SLOC) = 5994 Hits@level = [0] 241 [1] 80 [2] 108 [3] 6 [4] 37 [5] 0 Hits@level+ = [0+] 472 [1+] 231 [2+] 151 [3+] 43 [4+] 37 [5+] 0 Hits/KSLOC@level+ = [0+] 78.7454 [1+] 38.5385 [2+] 25.1919 [3+] 7.17384 [4+] 6.17284 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.