Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/pcb-rnd-2.3.0/scconfig/plugins.h
Examining data/pcb-rnd-2.3.0/scconfig/menucfg.c
Examining data/pcb-rnd-2.3.0/scconfig/revtest.c
Examining data/pcb-rnd-2.3.0/scconfig/src/scripts/find_funlisp.c
Examining data/pcb-rnd-2.3.0/scconfig/src/scripts/scripts.c
Examining data/pcb-rnd-2.3.0/scconfig/src/scripts/find_gpmi.c
Examining data/pcb-rnd-2.3.0/scconfig/src/scripts/INIT.h
Examining data/pcb-rnd-2.3.0/scconfig/src/scripts/find_python.c
Examining data/pcb-rnd-2.3.0/scconfig/src/scripts/find_fungw.c
Examining data/pcb-rnd-2.3.0/scconfig/src/scripts/find_guile.c
Examining data/pcb-rnd-2.3.0/scconfig/src/scripts/find_ruby.c
Examining data/pcb-rnd-2.3.0/scconfig/src/scripts/find_m4.c
Examining data/pcb-rnd-2.3.0/scconfig/src/scripts/find_stutter.c
Examining data/pcb-rnd-2.3.0/scconfig/src/scripts/find_lua.c
Examining data/pcb-rnd-2.3.0/scconfig/src/scripts/find_duktape.c
Examining data/pcb-rnd-2.3.0/scconfig/src/scripts/INIT.c
Examining data/pcb-rnd-2.3.0/scconfig/src/scripts/scripts.h
Examining data/pcb-rnd-2.3.0/scconfig/src/scripts/find_mruby.c
Examining data/pcb-rnd-2.3.0/scconfig/src/scripts/find_tcl.c
Examining data/pcb-rnd-2.3.0/scconfig/src/scripts/find_perl.c
Examining data/pcb-rnd-2.3.0/scconfig/src/scripts/find_mawk.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/lib_srctree.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/log.h
Examining data/pcb-rnd-2.3.0/scconfig/src/default/main_custom_args.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/find_libs.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/db.h
Examining data/pcb-rnd-2.3.0/scconfig/src/default/deps_default.h
Examining data/pcb-rnd-2.3.0/scconfig/src/default/find_uname.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/regex.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/str.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/find_io.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/main.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/lib_pkg_config.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/ht.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/find_environ.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/find.h
Examining data/pcb-rnd-2.3.0/scconfig/src/default/find_str.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/find_target.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/db.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/lib_compile.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/main_lib.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/libs.h
Examining data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/dep.h
Examining data/pcb-rnd-2.3.0/scconfig/src/default/hooks.h
Examining data/pcb-rnd-2.3.0/scconfig/src/default/log.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/deps_default.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/lib_filelist.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/find_proc.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/find_signal.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/main_lib.h
Examining data/pcb-rnd-2.3.0/scconfig/src/default/find_thread.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/find_sys.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/ht.h
Examining data/pcb-rnd-2.3.0/scconfig/src/default/find_time.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/regex.h
Examining data/pcb-rnd-2.3.0/scconfig/src/default/find_printf.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/main_custom_args.h
Examining data/pcb-rnd-2.3.0/scconfig/src/default/arg.h
Examining data/pcb-rnd-2.3.0/scconfig/src/default/lib_file.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/lib_uniqinc.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/dep.c
Examining data/pcb-rnd-2.3.0/scconfig/src/default/arg.c
Examining data/pcb-rnd-2.3.0/scconfig/src/parsgen/find_parsgen.c
Examining data/pcb-rnd-2.3.0/scconfig/src/parsgen/INIT.h
Examining data/pcb-rnd-2.3.0/scconfig/src/parsgen/INIT.c
Examining data/pcb-rnd-2.3.0/scconfig/src/util/arg_auto_set.h
Examining data/pcb-rnd-2.3.0/scconfig/src/util/cquote.c
Examining data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c
Examining data/pcb-rnd-2.3.0/scconfig/src/util/arg_auto_set.c
Examining data/pcb-rnd-2.3.0/scconfig/src/util/arg_auto_menu.c
Examining data/pcb-rnd-2.3.0/scconfig/src/util/ls.c
Examining data/pcb-rnd-2.3.0/scconfig/src/util/arg_auto_menu.h
Examining data/pcb-rnd-2.3.0/scconfig/src/c99/INIT.h
Examining data/pcb-rnd-2.3.0/scconfig/src/c99/find_c99.c
Examining data/pcb-rnd-2.3.0/scconfig/src/c99/INIT.c
Examining data/pcb-rnd-2.3.0/scconfig/src/sul/find_gen.c
Examining data/pcb-rnd-2.3.0/scconfig/src/sul/find_dmalloc.c
Examining data/pcb-rnd-2.3.0/scconfig/src/sul/find_dbus.c
Examining data/pcb-rnd-2.3.0/scconfig/src/sul/find_regex.c
Examining data/pcb-rnd-2.3.0/scconfig/src/sul/find_fs.c
Examining data/pcb-rnd-2.3.0/scconfig/src/sul/find_librnd.c
Examining data/pcb-rnd-2.3.0/scconfig/src/sul/find_freetype2.c
Examining data/pcb-rnd-2.3.0/scconfig/src/sul/find_glib.c
Examining data/pcb-rnd-2.3.0/scconfig/src/sul/find_libxml2.c
Examining data/pcb-rnd-2.3.0/scconfig/src/sul/INIT.h
Examining data/pcb-rnd-2.3.0/scconfig/src/sul/find_gettext.c
Examining data/pcb-rnd-2.3.0/scconfig/src/sul/find_pcre.c
Examining data/pcb-rnd-2.3.0/scconfig/src/sul/find_sul.c
Examining data/pcb-rnd-2.3.0/scconfig/src/sul/find_sul.h
Examining data/pcb-rnd-2.3.0/scconfig/src/sul/INIT.c
Examining data/pcb-rnd-2.3.0/scconfig/src/sul/find_iconv.c
Examining data/pcb-rnd-2.3.0/scconfig/src/sul/find_aspell.c
Examining data/pcb-rnd-2.3.0/scconfig/src/gui/find_gl.c
Examining data/pcb-rnd-2.3.0/scconfig/src/gui/find_gtk3.c
Examining data/pcb-rnd-2.3.0/scconfig/src/gui/find_misc.c
Examining data/pcb-rnd-2.3.0/scconfig/src/gui/find_x.c
Examining data/pcb-rnd-2.3.0/scconfig/src/gui/gui.c
Examining data/pcb-rnd-2.3.0/scconfig/src/gui/find_cairo.c
Examining data/pcb-rnd-2.3.0/scconfig/src/gui/find_gtk2.c
Examining data/pcb-rnd-2.3.0/scconfig/src/gui/INIT.h
Examining data/pcb-rnd-2.3.0/scconfig/src/gui/find_cairo.h
Examining data/pcb-rnd-2.3.0/scconfig/src/gui/find_gtk3.h
Examining data/pcb-rnd-2.3.0/scconfig/src/gui/find_gd.h
Examining data/pcb-rnd-2.3.0/scconfig/src/gui/find_gtk2.h
Examining data/pcb-rnd-2.3.0/scconfig/src/gui/find_gl.h
Examining data/pcb-rnd-2.3.0/scconfig/src/gui/find_gd.c
Examining data/pcb-rnd-2.3.0/scconfig/src/gui/INIT.c
Examining data/pcb-rnd-2.3.0/scconfig/src/gui/find_lesstif2.c
Examining data/pcb-rnd-2.3.0/scconfig/src/gui/find_lesstif2.h
Examining data/pcb-rnd-2.3.0/scconfig/src/gui/find_x.h
Examining data/pcb-rnd-2.3.0/scconfig/src/gui/find_misc.h
Examining data/pcb-rnd-2.3.0/scconfig/src/posix/find_posix.c
Examining data/pcb-rnd-2.3.0/scconfig/src/posix/find_fs.c
Examining data/pcb-rnd-2.3.0/scconfig/src/posix/find_dev.c
Examining data/pcb-rnd-2.3.0/scconfig/src/posix/find_log.c
Examining data/pcb-rnd-2.3.0/scconfig/src/posix/INIT.h
Examining data/pcb-rnd-2.3.0/scconfig/src/posix/find_posix.h
Examining data/pcb-rnd-2.3.0/scconfig/src/posix/find_res.c
Examining data/pcb-rnd-2.3.0/scconfig/src/posix/find_proc.c
Examining data/pcb-rnd-2.3.0/scconfig/src/posix/INIT.c
Examining data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/tmpfawk.c
Examining data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/libfawk_sc_fawk.c
Examining data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/tmpfawk.h
Examining data/pcb-rnd-2.3.0/scconfig/src/parser/parser.h
Examining data/pcb-rnd-2.3.0/scconfig/src/parser/INIT.h
Examining data/pcb-rnd-2.3.0/scconfig/src/parser/INIT.c
Examining data/pcb-rnd-2.3.0/scconfig/src/parser/find_expat.c
Examining data/pcb-rnd-2.3.0/scconfig/src/parser/parser.c
Examining data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm.h
Examining data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.h
Examining data/pcb-rnd-2.3.0/scconfig/src/tmpasm/debug.c
Examining data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c
Examining data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm.c
Examining data/pcb-rnd-2.3.0/scconfig/src/tmpasm/openfiles.c
Examining data/pcb-rnd-2.3.0/scconfig/src/tmpasm/debug.h
Examining data/pcb-rnd-2.3.0/scconfig/src/tmpasm/openfiles.h
Examining data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tester.c
Examining data/pcb-rnd-2.3.0/scconfig/src/math/find_func.c
Examining data/pcb-rnd-2.3.0/scconfig/src/math/find_fpenan.h
Examining data/pcb-rnd-2.3.0/scconfig/src/math/find_fpenan.c
Examining data/pcb-rnd-2.3.0/scconfig/src/math/find_func.h
Examining data/pcb-rnd-2.3.0/scconfig/src/math/INIT.h
Examining data/pcb-rnd-2.3.0/scconfig/src/math/find_math.c
Examining data/pcb-rnd-2.3.0/scconfig/src/math/find_mfunc_cc.c
Examining data/pcb-rnd-2.3.0/scconfig/src/math/INIT.c
Examining data/pcb-rnd-2.3.0/scconfig/src/math/find_mfunc_cc.h
Examining data/pcb-rnd-2.3.0/scconfig/src/menulib/scmenu.h
Examining data/pcb-rnd-2.3.0/scconfig/src/menulib/hrl_test.c
Examining data/pcb-rnd-2.3.0/scconfig/src/menulib/scmenu_text.c
Examining data/pcb-rnd-2.3.0/scconfig/src/menulib/vt100.c
Examining data/pcb-rnd-2.3.0/scconfig/src/menulib/scmenu_rl.c
Examining data/pcb-rnd-2.3.0/scconfig/src/menulib/scmenu_menu.c
Examining data/pcb-rnd-2.3.0/scconfig/src/menulib/scmenu.c
Examining data/pcb-rnd-2.3.0/scconfig/src/menulib/vt100.h
Examining data/pcb-rnd-2.3.0/scconfig/src/menulib/hookreadline.h
Examining data/pcb-rnd-2.3.0/scconfig/src/menulib/hookreadline.c
Examining data/pcb-rnd-2.3.0/scconfig/src/menulib/menu_test.c
Examining data/pcb-rnd-2.3.0/scconfig/src/generator/generator.c
Examining data/pcb-rnd-2.3.0/scconfig/src/generator/generator.h
Examining data/pcb-rnd-2.3.0/scconfig/src/generator/INIT.c
Examining data/pcb-rnd-2.3.0/scconfig/src/userpass/INIT.h
Examining data/pcb-rnd-2.3.0/scconfig/src/userpass/userpass.c
Examining data/pcb-rnd-2.3.0/scconfig/src/userpass/find_username.c
Examining data/pcb-rnd-2.3.0/scconfig/src/userpass/INIT.c
Examining data/pcb-rnd-2.3.0/scconfig/src/userpass/find_username.h
Examining data/pcb-rnd-2.3.0/scconfig/src/tty/find_ncurses.c
Examining data/pcb-rnd-2.3.0/scconfig/src/tty/find_slang.h
Examining data/pcb-rnd-2.3.0/scconfig/src/tty/find_ioctl.c
Examining data/pcb-rnd-2.3.0/scconfig/src/tty/find_ncurses.h
Examining data/pcb-rnd-2.3.0/scconfig/src/tty/find_pty.h
Examining data/pcb-rnd-2.3.0/scconfig/src/tty/INIT.h
Examining data/pcb-rnd-2.3.0/scconfig/src/tty/find_pty.c
Examining data/pcb-rnd-2.3.0/scconfig/src/tty/find_readline.h
Examining data/pcb-rnd-2.3.0/scconfig/src/tty/find_gpm.h
Examining data/pcb-rnd-2.3.0/scconfig/src/tty/find_slang.c
Examining data/pcb-rnd-2.3.0/scconfig/src/tty/find_gpm.c
Examining data/pcb-rnd-2.3.0/scconfig/src/tty/find_term.c
Examining data/pcb-rnd-2.3.0/scconfig/src/tty/INIT.c
Examining data/pcb-rnd-2.3.0/scconfig/src/tty/find_term.h
Examining data/pcb-rnd-2.3.0/scconfig/src/tty/tty.c
Examining data/pcb-rnd-2.3.0/scconfig/src/tty/find_readline.c
Examining data/pcb-rnd-2.3.0/scconfig/src/tty/find_ioctl.h
Examining data/pcb-rnd-2.3.0/scconfig/src/socket/socket.c
Examining data/pcb-rnd-2.3.0/scconfig/src/socket/INIT.h
Examining data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c
Examining data/pcb-rnd-2.3.0/scconfig/src/socket/find_dns.c
Examining data/pcb-rnd-2.3.0/scconfig/src/socket/INIT.c
Examining data/pcb-rnd-2.3.0/scconfig/src/socket/socket.h
Examining data/pcb-rnd-2.3.0/scconfig/src/socket/find_select.c
Examining data/pcb-rnd-2.3.0/scconfig/Rev.h
Examining data/pcb-rnd-2.3.0/scconfig/hooks.c
Examining data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/method_import.h
Examining data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/help.h
Examining data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/method.h
Examining data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/gsch2pcb.c
Examining data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/gsch2pcb.h
Examining data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/run.c
Examining data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/run.h
Examining data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/help.c
Examining data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/netlister.c
Examining data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/glue.c
Examining data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/gsch2pcb_rnd_conf.h
Examining data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/netlister.h
Examining data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/method_import.c
Examining data/pcb-rnd-2.3.0/util/bxl2txt/txt2bxl.c
Examining data/pcb-rnd-2.3.0/util/bxl2txt/bxl2txt.c
Examining data/pcb-rnd-2.3.0/src/obj_pstk_proto.c
Examining data/pcb-rnd-2.3.0/src/ht_subc.c
Examining data/pcb-rnd-2.3.0/src/obj_gfx_draw.h
Examining data/pcb-rnd-2.3.0/src/vtr0.h
Examining data/pcb-rnd-2.3.0/src/obj_arc_op.h
Examining data/pcb-rnd-2.3.0/src/select_act.c
Examining data/pcb-rnd-2.3.0/src/thermal.c
Examining data/pcb-rnd-2.3.0/src/crosshair.h
Examining data/pcb-rnd-2.3.0/src/move.h
Examining data/pcb-rnd-2.3.0/src/thermal.h
Examining data/pcb-rnd-2.3.0/src/vtpadstack.c
Examining data/pcb-rnd-2.3.0/src/font.h
Examining data/pcb-rnd-2.3.0/src/stub_draw.c
Examining data/pcb-rnd-2.3.0/src/vtr0.c
Examining data/pcb-rnd-2.3.0/src/obj_gfx.h
Examining data/pcb-rnd-2.3.0/src/gui_act.c
Examining data/pcb-rnd-2.3.0/src/obj_pinvia_therm.c
Examining data/pcb-rnd-2.3.0/src/file_act.c
Examining data/pcb-rnd-2.3.0/src/polygon.c
Examining data/pcb-rnd-2.3.0/src/obj_text.c
Examining data/pcb-rnd-2.3.0/src/rotate.c
Examining data/pcb-rnd-2.3.0/src/hid_cam.h
Examining data/pcb-rnd-2.3.0/src/layer_grp.h
Examining data/pcb-rnd-2.3.0/src/hid_cam.c
Examining data/pcb-rnd-2.3.0/src/box_dir.h
Examining data/pcb-rnd-2.3.0/src/extobj_helper.h
Examining data/pcb-rnd-2.3.0/src/layer_vis.c
Examining data/pcb-rnd-2.3.0/src/extobj.c
Examining data/pcb-rnd-2.3.0/src/obj_pstk_shape.h
Examining data/pcb-rnd-2.3.0/src/extobj_act.c
Examining data/pcb-rnd-2.3.0/src/draw_label_smart.c
Examining data/pcb-rnd-2.3.0/src/pcb_minuid.c
Examining data/pcb-rnd-2.3.0/src/font_act.c
Examining data/pcb-rnd-2.3.0/src/brave.c
Examining data/pcb-rnd-2.3.0/src/obj_rat.h
Examining data/pcb-rnd-2.3.0/src/pixmap_pcb.h
Examining data/pcb-rnd-2.3.0/src/obj_poly.h
Examining data/pcb-rnd-2.3.0/src/obj_common.h
Examining data/pcb-rnd-2.3.0/src/obj_arc_list.h
Examining data/pcb-rnd-2.3.0/src/flag_str.h
Examining data/pcb-rnd-2.3.0/src/draw_ly_spec.c
Examining data/pcb-rnd-2.3.0/src/stub_draw.h
Examining data/pcb-rnd-2.3.0/src/plug_import.h
Examining data/pcb-rnd-2.3.0/src/netlist.c
Examining data/pcb-rnd-2.3.0/src/obj_line.c
Examining data/pcb-rnd-2.3.0/src/obj_text_op.h
Examining data/pcb-rnd-2.3.0/src/obj_term.h
Examining data/pcb-rnd-2.3.0/src/obj_pstk_act.c
Examining data/pcb-rnd-2.3.0/src/obj_poly.c
Examining data/pcb-rnd-2.3.0/src/actions_pcb.h
Examining data/pcb-rnd-2.3.0/src/obj_arc_draw.h
Examining data/pcb-rnd-2.3.0/src/actions_pcb.c
Examining data/pcb-rnd-2.3.0/src/main.c
Examining data/pcb-rnd-2.3.0/src/obj_pstk_op.h
Examining data/pcb-rnd-2.3.0/src/remove.h
Examining data/pcb-rnd-2.3.0/src/polygon.h
Examining data/pcb-rnd-2.3.0/src/draw.h
Examining data/pcb-rnd-2.3.0/src/rats_patch.h
Examining data/pcb-rnd-2.3.0/src/find.h
Examining data/pcb-rnd-2.3.0/src/plug_footprint_act.c
Examining data/pcb-rnd-2.3.0/src/build_run.h
Examining data/pcb-rnd-2.3.0/src/remove.c
Examining data/pcb-rnd-2.3.0/src/obj_line_op.h
Examining data/pcb-rnd-2.3.0/src/pixmap_pcb.c
Examining data/pcb-rnd-2.3.0/src/obj_text_list.c
Examining data/pcb-rnd-2.3.0/src/insert.c
Examining data/pcb-rnd-2.3.0/src/data_parent.h
Examining data/pcb-rnd-2.3.0/src/flag.c
Examining data/pcb-rnd-2.3.0/src/obj_pstk_inlines.h
Examining data/pcb-rnd-2.3.0/src/buffer.c
Examining data/pcb-rnd-2.3.0/src/search.h
Examining data/pcb-rnd-2.3.0/src/obj_pstk.h
Examining data/pcb-rnd-2.3.0/src/obj_gfx.c
Examining data/pcb-rnd-2.3.0/src/attrib.h
Examining data/pcb-rnd-2.3.0/src/plug_footprint.h
Examining data/pcb-rnd-2.3.0/src/obj_subc_list.h
Examining data/pcb-rnd-2.3.0/src/obj_arc_list.c
Examining data/pcb-rnd-2.3.0/src/vtpadstack_t.h
Examining data/pcb-rnd-2.3.0/src/list_common.h
Examining data/pcb-rnd-2.3.0/src/obj_gfx_op.h
Examining data/pcb-rnd-2.3.0/src/data_list.h
Examining data/pcb-rnd-2.3.0/src/flag.h
Examining data/pcb-rnd-2.3.0/src/obj_poly_op.h
Examining data/pcb-rnd-2.3.0/src/layer_ui.c
Examining data/pcb-rnd-2.3.0/src/obj_pstk_list.h
Examining data/pcb-rnd-2.3.0/src/change.c
Examining data/pcb-rnd-2.3.0/src/view.h
Examining data/pcb-rnd-2.3.0/src/hidlib_pcb.c
Examining data/pcb-rnd-2.3.0/src/idpath.c
Examining data/pcb-rnd-2.3.0/src/find.c
Examining data/pcb-rnd-2.3.0/src/data.h
Examining data/pcb-rnd-2.3.0/src/flag_str.c
Examining data/pcb-rnd-2.3.0/src/route_style.h
Examining data/pcb-rnd-2.3.0/src/tool_logic.c
Examining data/pcb-rnd-2.3.0/src/obj_line_list.h
Examining data/pcb-rnd-2.3.0/src/obj_text.h
Examining data/pcb-rnd-2.3.0/src/route_style.c
Examining data/pcb-rnd-2.3.0/src/plug_footprint.c
Examining data/pcb-rnd-2.3.0/src/extobj.h
Examining data/pcb-rnd-2.3.0/src/obj_line_list.c
Examining data/pcb-rnd-2.3.0/src/move.c
Examining data/pcb-rnd-2.3.0/src/obj_text_list.h
Examining data/pcb-rnd-2.3.0/src/obj_term.c
Examining data/pcb-rnd-2.3.0/src/conf_core.c
Examining data/pcb-rnd-2.3.0/src/plug_io.h
Examining data/pcb-rnd-2.3.0/src/layer_ui.h
Examining data/pcb-rnd-2.3.0/src/obj_rat_op.h
Examining data/pcb-rnd-2.3.0/src/draw.c
Examining data/pcb-rnd-2.3.0/src/ht_subc.h
Examining data/pcb-rnd-2.3.0/src/layer.c
Examining data/pcb-rnd-2.3.0/src/obj_rat_list.c
Examining data/pcb-rnd-2.3.0/src/obj_poly_draw_helper.c
Examining data/pcb-rnd-2.3.0/src/change.h
Examining data/pcb-rnd-2.3.0/src/layer_it.h
Examining data/pcb-rnd-2.3.0/src/route.c
Examining data/pcb-rnd-2.3.0/src/obj_poly_list.h
Examining data/pcb-rnd-2.3.0/src/obj_line.h
Examining data/pcb-rnd-2.3.0/src/vtroutestyle.c
Examining data/pcb-rnd-2.3.0/src/object_act.c
Examining data/pcb-rnd-2.3.0/src/obj_gfx_list.c
Examining data/pcb-rnd-2.3.0/src/find_any_isect.c
Examining data/pcb-rnd-2.3.0/src/undo_old.h
Examining data/pcb-rnd-2.3.0/src/obj_pstk_op.c
Examining data/pcb-rnd-2.3.0/src/obj_arc.h
Examining data/pcb-rnd-2.3.0/src/search_r.h
Examining data/pcb-rnd-2.3.0/src/obj_poly_draw.h
Examining data/pcb-rnd-2.3.0/src/layer_addr.c
Examining data/pcb-rnd-2.3.0/src/undo.h
Examining data/pcb-rnd-2.3.0/src/globalconst.h
Examining data/pcb-rnd-2.3.0/src/idpath.h
Examining data/pcb-rnd-2.3.0/src/find_geo.c
Examining data/pcb-rnd-2.3.0/src/event.c
Examining data/pcb-rnd-2.3.0/src/obj_pstk.c
Examining data/pcb-rnd-2.3.0/src/insert.h
Examining data/pcb-rnd-2.3.0/src/obj_gfx_list.h
Examining data/pcb-rnd-2.3.0/src/vtlibrary.c
Examining data/pcb-rnd-2.3.0/src/select.c
Examining data/pcb-rnd-2.3.0/src/rotate.h
Examining data/pcb-rnd-2.3.0/src/vtlibrary.h
Examining data/pcb-rnd-2.3.0/src/intersect.c
Examining data/pcb-rnd-2.3.0/src/obj_subc_hash.c
Examining data/pcb-rnd-2.3.0/src/undo_act.c
Examining data/pcb-rnd-2.3.0/src/obj_line_draw.h
Examining data/pcb-rnd-2.3.0/src/crosshair.c
Examining data/pcb-rnd-2.3.0/src/conf_core.h
Examining data/pcb-rnd-2.3.0/src/main_act.c
Examining data/pcb-rnd-2.3.0/src/global_typedefs.h
Examining data/pcb-rnd-2.3.0/src/netlist_geo.c
Examining data/pcb-rnd-2.3.0/src/obj_subc.h
Examining data/pcb-rnd-2.3.0/src/intersect.h
Examining data/pcb-rnd-2.3.0/src/event.h
Examining data/pcb-rnd-2.3.0/src/draw_composite.c
Examining data/pcb-rnd-2.3.0/src/change_act.c
Examining data/pcb-rnd-2.3.0/src/obj_pstk_list.c
Examining data/pcb-rnd-2.3.0/src/undo_old.c
Examining data/pcb-rnd-2.3.0/src/obj_line_drcenf.c
Examining data/pcb-rnd-2.3.0/src/operation.c
Examining data/pcb-rnd-2.3.0/src/drc.c
Examining data/pcb-rnd-2.3.0/src/attrib.c
Examining data/pcb-rnd-2.3.0/src/buffer.h
Examining data/pcb-rnd-2.3.0/src/netlist_act.c
Examining data/pcb-rnd-2.3.0/src/obj_pinvia_therm.h
Examining data/pcb-rnd-2.3.0/src/obj_hash.h
Examining data/pcb-rnd-2.3.0/src/layer_addr.h
Examining data/pcb-rnd-2.3.0/src/operation.h
Examining data/pcb-rnd-2.3.0/src/draw_wireframe.h
Examining data/pcb-rnd-2.3.0/src/pcb_minuid.h
Examining data/pcb-rnd-2.3.0/src/data_it.h
Examining data/pcb-rnd-2.3.0/src/vtroutestyle.h
Examining data/pcb-rnd-2.3.0/src/plug_io.c
Examining data/pcb-rnd-2.3.0/src/obj_arc_ui.c
Examining data/pcb-rnd-2.3.0/src/view.c
Examining data/pcb-rnd-2.3.0/src/search.c
Examining data/pcb-rnd-2.3.0/src/obj_arc.c
Examining data/pcb-rnd-2.3.0/src/buildin.h
Examining data/pcb-rnd-2.3.0/src/build_run.c
Examining data/pcb-rnd-2.3.0/src/vtpadstack.h
Examining data/pcb-rnd-2.3.0/src/obj_pstk_draw.h
Examining data/pcb-rnd-2.3.0/src/rats_act.c
Examining data/pcb-rnd-2.3.0/src/funchash_core_list.h
Examining data/pcb-rnd-2.3.0/src/layer.h
Examining data/pcb-rnd-2.3.0/src/obj_common.c
Examining data/pcb-rnd-2.3.0/src/obj_subc_parent.h
Examining data/pcb-rnd-2.3.0/src/layer_vis.h
Examining data/pcb-rnd-2.3.0/src/tool_logic.h
Examining data/pcb-rnd-2.3.0/src/data.c
Examining data/pcb-rnd-2.3.0/src/funchash_core.h
Examining data/pcb-rnd-2.3.0/src/remove_act.c
Examining data/pcb-rnd-2.3.0/src/obj_rat_draw.h
Examining data/pcb-rnd-2.3.0/src/route_draw.h
Examining data/pcb-rnd-2.3.0/src/layer_grp.c
Examining data/pcb-rnd-2.3.0/src/font_internal.c
Examining data/pcb-rnd-2.3.0/src/obj_subc_list.c
Examining data/pcb-rnd-2.3.0/src/undo.c
Examining data/pcb-rnd-2.3.0/src/select.h
Examining data/pcb-rnd-2.3.0/src/undo_act.h
Examining data/pcb-rnd-2.3.0/src/board.h
Examining data/pcb-rnd-2.3.0/src/board.c
Examining data/pcb-rnd-2.3.0/src/obj_subc_op.h
Examining data/pcb-rnd-2.3.0/src/obj_poly_list.c
Examining data/pcb-rnd-2.3.0/src/font.c
Examining data/pcb-rnd-2.3.0/src/obj_text_draw.h
Examining data/pcb-rnd-2.3.0/src/plug_import.c
Examining data/pcb-rnd-2.3.0/src/rats_patch.c
Examining data/pcb-rnd-2.3.0/src/brave.h
Examining data/pcb-rnd-2.3.0/src/polygon_act.c
Examining data/pcb-rnd-2.3.0/src/obj_subc.c
Examining data/pcb-rnd-2.3.0/src/vtpadstack_t.c
Examining data/pcb-rnd-2.3.0/src/netlist.h
Examining data/pcb-rnd-2.3.0/src/obj_rat.c
Examining data/pcb-rnd-2.3.0/src/route.h
Examining data/pcb-rnd-2.3.0/src/conf_act.c
Examining data/pcb-rnd-2.3.0/src/obj_arc_ui.h
Examining data/pcb-rnd-2.3.0/src/obj_rat_list.h
Examining data/pcb-rnd-2.3.0/src/drc.h
Examining data/pcb-rnd-2.3.0/doc/developer/plugin/conf.h
Examining data/pcb-rnd-2.3.0/doc/developer/plugin/template_pup/ext_foo.c
Examining data/pcb-rnd-2.3.0/doc/developer/plugin/template/foobar.c
Examining data/pcb-rnd-2.3.0/doc/developer/plugin/template_fungw/ext_bar.c
Examining data/pcb-rnd-2.3.0/doc/developer/dad/TEMPLATE_MODAL.c
Examining data/pcb-rnd-2.3.0/doc/developer/dad/TEMPLATE.c
Examining data/pcb-rnd-2.3.0/tests/strflags/tester.c
Examining data/pcb-rnd-2.3.0/tests/remote/test_parse.c
Examining data/pcb-rnd-2.3.0/tests/io_bxl/test_parse.c
Examining data/pcb-rnd-2.3.0/tests/io_bxl/glue.c
Examining data/pcb-rnd-2.3.0/tests/propedit/tester.c
Examining data/pcb-rnd-2.3.0/tests/uniq_name/tester.c
Examining data/pcb-rnd-2.3.0/tests/base64/main.c
Examining data/pcb-rnd-2.3.0/tests/conf/help.c
Examining data/pcb-rnd-2.3.0/tests/conf/conftest.c
Examining data/pcb-rnd-2.3.0/tests/pcb-printf/prcli.c
Examining data/pcb-rnd-2.3.0/tests/pcb-printf/tester.c
Examining data/pcb-rnd-2.3.0/tests/pcb-printf/prclimq.c
Examining data/pcb-rnd-2.3.0/src_plugins/ddraft/cli.c
Examining data/pcb-rnd-2.3.0/src_plugins/ddraft/cli_line.c
Examining data/pcb-rnd-2.3.0/src_plugins/ddraft/constraint_gui.c
Examining data/pcb-rnd-2.3.0/src_plugins/ddraft/constraint.c
Examining data/pcb-rnd-2.3.0/src_plugins/ddraft/ddraft.c
Examining data/pcb-rnd-2.3.0/src_plugins/ddraft/trim.c
Examining data/pcb-rnd-2.3.0/src_plugins/ddraft/centgeo.h
Examining data/pcb-rnd-2.3.0/src_plugins/ddraft/centgeo.c
Examining data/pcb-rnd-2.3.0/src_plugins/fp_wget/fp_wget.c
Examining data/pcb-rnd-2.3.0/src_plugins/fp_wget/edakrill.c
Examining data/pcb-rnd-2.3.0/src_plugins/fp_wget/fp_wget_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/fp_wget/wget_common.h
Examining data/pcb-rnd-2.3.0/src_plugins/fp_wget/wget_common.c
Examining data/pcb-rnd-2.3.0/src_plugins/fp_wget/edakrill.h
Examining data/pcb-rnd-2.3.0/src_plugins/fp_wget/tester.c
Examining data/pcb-rnd-2.3.0/src_plugins/fp_wget/gedasymbols.c
Examining data/pcb-rnd-2.3.0/src_plugins/fp_wget/gedasymbols.h
Examining data/pcb-rnd-2.3.0/src_plugins/export_ipcd356/ipcd356.c
Examining data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c
Examining data/pcb-rnd-2.3.0/src_plugins/act_read/act_geo.c
Examining data/pcb-rnd-2.3.0/src_plugins/act_read/act_read.c
Examining data/pcb-rnd-2.3.0/src_plugins/act_read/act_idpath.c
Examining data/pcb-rnd-2.3.0/src_plugins/act_read/act_layer.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_gcode/gcode.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_formula/test/main.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_formula/test/glue.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_formula/bisect.h
Examining data/pcb-rnd-2.3.0/src_plugins/lib_formula/impedance.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_formula/bisect.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_formula/impedance.h
Examining data/pcb-rnd-2.3.0/src_plugins/lib_formula/lib_formula.c
Examining data/pcb-rnd-2.3.0/src_plugins/act_draw/act_pstk_proto.c
Examining data/pcb-rnd-2.3.0/src_plugins/act_draw/act_draw.c
Examining data/pcb-rnd-2.3.0/src_plugins/act_draw/act_polybool.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_eagle/read_dru.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_eagle/read.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_eagle/trparse_xml.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_eagle/trparse_bin.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_eagle/trparse.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_eagle/read_dru.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_eagle/trparse_bin.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_eagle/read.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_eagle/trparse_xml.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_eagle/io_eagle.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_eagle/egb_tree.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_eagle/egb_tree.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.h
Examining data/pcb-rnd-2.3.0/src_plugins/sketch_route/wire.h
Examining data/pcb-rnd-2.3.0/src_plugins/sketch_route/ewire_point.c
Examining data/pcb-rnd-2.3.0/src_plugins/sketch_route/pointdata.c
Examining data/pcb-rnd-2.3.0/src_plugins/sketch_route/pointdata.h
Examining data/pcb-rnd-2.3.0/src_plugins/sketch_route/spoke.h
Examining data/pcb-rnd-2.3.0/src_plugins/sketch_route/spoke.c
Examining data/pcb-rnd-2.3.0/src_plugins/sketch_route/sktypedefs.h
Examining data/pcb-rnd-2.3.0/src_plugins/sketch_route/sketch_route.c
Examining data/pcb-rnd-2.3.0/src_plugins/sketch_route/ewire.c
Examining data/pcb-rnd-2.3.0/src_plugins/sketch_route/wire.c
Examining data/pcb-rnd-2.3.0/src_plugins/sketch_route/ewire_point.h
Examining data/pcb-rnd-2.3.0/src_plugins/sketch_route/ewire.h
Examining data/pcb-rnd-2.3.0/src_plugins/extedit/extedit.c
Examining data/pcb-rnd-2.3.0/src_plugins/extedit/extedit_dad.c
Examining data/pcb-rnd-2.3.0/src_plugins/polystitch/polystitch.c
Examining data/pcb-rnd-2.3.0/src_plugins/ar_cpcb/ar_cpcb.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_excellon/aperture.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_excellon/excellon.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_excellon/aperture.h
Examining data/pcb-rnd-2.3.0/src_plugins/export_excellon/excellon.h
Examining data/pcb-rnd-2.3.0/src_plugins/export_excellon/excellon_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/ch_editpoint/ch_editpoint.c
Examining data/pcb-rnd-2.3.0/src_plugins/ch_editpoint/ch_editpoint_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/infobar.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/status.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/rendering.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layer_menu.h
Examining data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/routest.h
Examining data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layer_menu.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/lib_hid_pcbui.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layersel.h
Examining data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/routest_dlg.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/status.h
Examining data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layersel.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/util.h
Examining data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/routest.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/title.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/act.h
Examining data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/util.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/act.c
Examining data/pcb-rnd-2.3.0/src_plugins/djopt/djopt.c
Examining data/pcb-rnd-2.3.0/src_plugins/djopt/djopt_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/djopt/djopt.h
Examining data/pcb-rnd-2.3.0/src_plugins/import_hpgl/hpgl.c
Examining data/pcb-rnd-2.3.0/src_plugins/draw_fontsel/draw_fontsel.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_mentor_cell/read.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_mentor_cell/read_net.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_mentor_cell/read_pstk.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_mentor_cell/read.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_mentor_cell/font_geo.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_mentor_cell/io_mentor_cell.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_mentor_cell/font.c
Examining data/pcb-rnd-2.3.0/src_plugins/drc_query/drc_query.c
Examining data/pcb-rnd-2.3.0/src_plugins/drc_query/drc_query_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/drc_query/drc_query_stat.c
Examining data/pcb-rnd-2.3.0/src_plugins/drc_query/dlg.c
Examining data/pcb-rnd-2.3.0/src_plugins/drc_query/drc_lht.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_vfs_fuse/export_vfs_fuse.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_tinycad/tinycad.c
Examining data/pcb-rnd-2.3.0/src_plugins/fontmode/fontmode.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_openscad/scad_models.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_openscad/export_openscad.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_openscad/scad_draw.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_pcb/file.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_pcb/parse_l.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_pcb/io_pcb.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_pcb/file.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_pcb/parse_l.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_pcb/parse_common.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_pcb/parse_y.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_pcb/parse_y.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_pcb/attribs.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_pcb/attribs.h
Examining data/pcb-rnd-2.3.0/src_plugins/millpath/toolpath.c
Examining data/pcb-rnd-2.3.0/src_plugins/millpath/toolpath.h
Examining data/pcb-rnd-2.3.0/src_plugins/millpath/millpath.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_bxl/bxl_decode.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_bxl/read.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_bxl/bxl_decode.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_bxl/bxl_gram.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_bxl/read.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_bxl/bxl_lex.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_bxl/bxl_lex.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_bxl/bxl.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_bxl/bxl_gram.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_bxl/io_bxl.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_netlist/import_netlist.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_tedax/tboard.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_tedax/tdrc_query.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_tedax/tnetlist.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_tedax/stackup.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_tedax/tdrc.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_tedax/io_tedax.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_tedax/tlayer.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_tedax/trouter.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_tedax/parse.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_tedax/tetest.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_tedax/tnetlist.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_tedax/parse.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_tedax/tdrc.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_tedax/tetest.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_tedax/footprint.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_tedax/footprint.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_tedax/tlayer.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_tedax/trouter.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_tedax/tboard.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_tedax/stackup.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_tedax/common_inlines.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_tedax/tdrc_query.h
Examining data/pcb-rnd-2.3.0/src_plugins/import_sch2/import_sch_dlg.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_sch2/import_sch.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_sch2/import_sch_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/import_calay/calay.c
Examining data/pcb-rnd-2.3.0/src_plugins/order_pcbway/pcbway.c
Examining data/pcb-rnd-2.3.0/src_plugins/order_pcbway/order_pcbway_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/autoroute/autoroute.c
Examining data/pcb-rnd-2.3.0/src_plugins/autoroute/vector.h
Examining data/pcb-rnd-2.3.0/src_plugins/autoroute/mtspace.c
Examining data/pcb-rnd-2.3.0/src_plugins/autoroute/vector.c
Examining data/pcb-rnd-2.3.0/src_plugins/autoroute/mtspace.h
Examining data/pcb-rnd-2.3.0/src_plugins/autoroute/autoroute.h
Examining data/pcb-rnd-2.3.0/src_plugins/autoroute/action.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_bom/bom.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_ltspice/ltspice.c
Examining data/pcb-rnd-2.3.0/src_plugins/exto_std/cord.c
Examining data/pcb-rnd-2.3.0/src_plugins/exto_std/wholepoly.c
Examining data/pcb-rnd-2.3.0/src_plugins/exto_std/exto_std.c
Examining data/pcb-rnd-2.3.0/src_plugins/exto_std/bus.c
Examining data/pcb-rnd-2.3.0/src_plugins/exto_std/line_of_vias.c
Examining data/pcb-rnd-2.3.0/src_plugins/exto_std/dimension.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_vfs/lib_vfs.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_vfs/lib_vfs.h
Examining data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_edif/edif_parse.h
Examining data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.h
Examining data/pcb-rnd-2.3.0/src_plugins/import_edif/import_edif.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_oldconn/oldconn.c
Examining data/pcb-rnd-2.3.0/src_plugins/autocrop/autocrop.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_pads_net/pads_net.c
Examining data/pcb-rnd-2.3.0/src_plugins/script/live_script.c
Examining data/pcb-rnd-2.3.0/src_plugins/script/script_act.c
Examining data/pcb-rnd-2.3.0/src_plugins/script/perma.c
Examining data/pcb-rnd-2.3.0/src_plugins/script/script.h
Examining data/pcb-rnd-2.3.0/src_plugins/script/timer.c
Examining data/pcb-rnd-2.3.0/src_plugins/script/c_script.c
Examining data/pcb-rnd-2.3.0/src_plugins/script/live_script.h
Examining data/pcb-rnd-2.3.0/src_plugins/script/script.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_kicad/write.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_kicad/write.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_kicad/uniq_name.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_kicad/uniq_name.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_kicad/read.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_kicad/read_net.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_kicad/read.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_kicad/layertab.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_kicad/io_kicad.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_kicad/read_net.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_kicad/layertab.h
Examining data/pcb-rnd-2.3.0/src_plugins/polycombine/polycombine.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_gerber/gerber.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_gerber/gerber_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/export_png/png_photo2.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_png/png.h
Examining data/pcb-rnd-2.3.0/src_plugins/export_png/png_photo1.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_png/png.c
Examining data/pcb-rnd-2.3.0/src_plugins/cam/cam_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/cam/cam_compile.h
Examining data/pcb-rnd-2.3.0/src_plugins/cam/cam_compile.c
Examining data/pcb-rnd-2.3.0/src_plugins/cam/cam_gui.c
Examining data/pcb-rnd-2.3.0/src_plugins/cam/cam.c
Examining data/pcb-rnd-2.3.0/src_plugins/query/query_access.c
Examining data/pcb-rnd-2.3.0/src_plugins/query/dlg_search_edit.c
Examining data/pcb-rnd-2.3.0/src_plugins/query/net_int.c
Examining data/pcb-rnd-2.3.0/src_plugins/query/query_act.c
Examining data/pcb-rnd-2.3.0/src_plugins/query/fnc_layer_setup.c
Examining data/pcb-rnd-2.3.0/src_plugins/query/fnc_list.c
Examining data/pcb-rnd-2.3.0/src_plugins/query/net_len.h
Examining data/pcb-rnd-2.3.0/src_plugins/query/net_int.h
Examining data/pcb-rnd-2.3.0/src_plugins/query/query_exec.h
Examining data/pcb-rnd-2.3.0/src_plugins/query/dlg_search.c
Examining data/pcb-rnd-2.3.0/src_plugins/query/query_access.h
Examining data/pcb-rnd-2.3.0/src_plugins/query/dlg_search_tab.h
Examining data/pcb-rnd-2.3.0/src_plugins/query/fnc.c
Examining data/pcb-rnd-2.3.0/src_plugins/query/query_l.c
Examining data/pcb-rnd-2.3.0/src_plugins/query/query.h
Examining data/pcb-rnd-2.3.0/src_plugins/query/query_y.c
Examining data/pcb-rnd-2.3.0/src_plugins/query/query.c
Examining data/pcb-rnd-2.3.0/src_plugins/query/dlg_search.h
Examining data/pcb-rnd-2.3.0/src_plugins/query/fnc_glue.c
Examining data/pcb-rnd-2.3.0/src_plugins/query/fnc_obj.c
Examining data/pcb-rnd-2.3.0/src_plugins/query/query_l.h
Examining data/pcb-rnd-2.3.0/src_plugins/query/query_y.h
Examining data/pcb-rnd-2.3.0/src_plugins/query/query_exec.c
Examining data/pcb-rnd-2.3.0/src_plugins/query/fnc_geo.c
Examining data/pcb-rnd-2.3.0/src_plugins/query/net_len.c
Examining data/pcb-rnd-2.3.0/src_plugins/propedit/propedit.c
Examining data/pcb-rnd-2.3.0/src_plugins/propedit/propsel.c
Examining data/pcb-rnd-2.3.0/src_plugins/propedit/props.h
Examining data/pcb-rnd-2.3.0/src_plugins/propedit/propdlg.c
Examining data/pcb-rnd-2.3.0/src_plugins/propedit/propsel.h
Examining data/pcb-rnd-2.3.0/src_plugins/propedit/props.c
Examining data/pcb-rnd-2.3.0/src_plugins/propedit/propdlg.h
Examining data/pcb-rnd-2.3.0/src_plugins/import_accel_net/accel_net.c
Examining data/pcb-rnd-2.3.0/src_plugins/teardrops/teardrops.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_orcad_net/orcad_net.c
Examining data/pcb-rnd-2.3.0/src_plugins/vendordrill/vendor.c
Examining data/pcb-rnd-2.3.0/src_plugins/vendordrill/vendor_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/shand_cmd/command.h
Examining data/pcb-rnd-2.3.0/src_plugins/shand_cmd/command.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_net_cmd/import_net_cmd.c
Examining data/pcb-rnd-2.3.0/src_plugins/renumber/renumberblock.c
Examining data/pcb-rnd-2.3.0/src_plugins/renumber/renumber.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_board.h
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_loadsave.h
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_lib.h
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_layer_binding.h
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_conf.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_obj_list.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_layer_flags.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_fpmap.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_infobar.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_loadsave.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_lib.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_key.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref.h
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_library.h
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_sizes.h
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_export.h
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_library.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_win.h
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_win.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_view.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_about.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_key.h
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_general.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_color.h
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_printcalib.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_menu.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_lib_pstk.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_test.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_fontsel.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_confedit.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_about.h
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_plugins.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_undo.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_fontsel.h
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_layer_flags.h
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pinout.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_flag_edit.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_library_param.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_color.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_padstack.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_view.h
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_flag_edit.h
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_general.h
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_layer_binding.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_netlist.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_board.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_menu.h
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_lib_pstk.h
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_layer.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_export.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dialogs.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_padstack.h
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_sizes.c
Examining data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_infobar.h
Examining data/pcb-rnd-2.3.0/src_plugins/draw_csect/draw_csect.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_lihata/write_style.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_lihata/common.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_lihata/common.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_lihata/io_lihata.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_lihata/read.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_lihata/write_style.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_lihata/read.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_lihata/io_lihata.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_lihata/lht_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/export_vfs_mc/export_vfs_mc.c
Examining data/pcb-rnd-2.3.0/src_plugins/oldactions/oldactions.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_lpr/lpr.c
Examining data/pcb-rnd-2.3.0/src_plugins/serpentine/serpentine_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/serpentine/serpentine.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_fidocadj/fidocadj.c
Examining data/pcb-rnd-2.3.0/src_plugins/rubberband_orig/rubberband_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/rubberband_orig/fgeometry.h
Examining data/pcb-rnd-2.3.0/src_plugins/rubberband_orig/rubberband.c
Examining data/pcb-rnd-2.3.0/src_plugins/rubberband_orig/rubberband.h
Examining data/pcb-rnd-2.3.0/src_plugins/rubberband_orig/fgeometry.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_ps/eps.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_ps/ps.h
Examining data/pcb-rnd-2.3.0/src_plugins/export_ps/ps.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_pxm_pnm/import_pxm_pnm.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_dsn/dsn.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_protel_net/protel_net.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_net_action/import_net_action.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_xy/xy.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_xy/xy_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/puller/puller.c
Examining data/pcb-rnd-2.3.0/src_plugins/order/order_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/order/order_dlg.c
Examining data/pcb-rnd-2.3.0/src_plugins/order/order.c
Examining data/pcb-rnd-2.3.0/src_plugins/order/order.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_dsn/write.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_dsn/write.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_dsn/read.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_dsn/read.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_dsn/io_dsn.c
Examining data/pcb-rnd-2.3.0/src_plugins/jostle/jostle.c
Examining data/pcb-rnd-2.3.0/src_plugins/distalign/distalign.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_gnetlist/import_gnetlist.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_gnetlist/import_gnetlist_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/import_fpcb_nl/fpcb_nl.c
Examining data/pcb-rnd-2.3.0/src_plugins/fp_board/fp_board.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_hyp/write.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_hyp/write.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_hyp/parser.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_hyp/hyp_y.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_hyp/hyp_l.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_hyp/hyp_l.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_hyp/io_hyp.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_hyp/hyp_y.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_hyp/parser.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_svg/svg.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_ipcd356/ipcd356.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_openems/mesh.h
Examining data/pcb-rnd-2.3.0/src_plugins/export_openems/mesh.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_openems/export_openems.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_openems/openems_xml.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_openems/excitation.c
Examining data/pcb-rnd-2.3.0/src_plugins/expfeat/expfeat.c
Examining data/pcb-rnd-2.3.0/src_plugins/mincut/rats_mincut_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/main.c
Examining data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/graph.h
Examining data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/load.h
Examining data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/solve.c
Examining data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/solve.h
Examining data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/graph.c
Examining data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/load.c
Examining data/pcb-rnd-2.3.0/src_plugins/mincut/rats_mincut.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_pxm_gd/import_pxm_gd.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_ttf/ttf_load.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_ttf/str_approx.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_ttf/str_approx.h
Examining data/pcb-rnd-2.3.0/src_plugins/import_ttf/ttf_load.h
Examining data/pcb-rnd-2.3.0/src_plugins/import_ttf/ttf.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_mentor_sch/mentor_sch_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/import_mentor_sch/mentor_sch.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_mentor_sch/netlist_helper.c
Examining data/pcb-rnd-2.3.0/src_plugins/import_mentor_sch/netlist_helper.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_kicad_legacy/write.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_kicad_legacy/write.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_kicad_legacy/io_kicad_legacy.c
Examining data/pcb-rnd-2.3.0/src_plugins/ch_onpoint/ch_onpoint.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_compat_help/layer_compat.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_compat_help/lib_compat_help.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_compat_help/pstk_compat.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_compat_help/subc_help.h
Examining data/pcb-rnd-2.3.0/src_plugins/lib_compat_help/media.h
Examining data/pcb-rnd-2.3.0/src_plugins/lib_compat_help/pstk_help.h
Examining data/pcb-rnd-2.3.0/src_plugins/lib_compat_help/pstk_help.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_compat_help/pstk_compat.h
Examining data/pcb-rnd-2.3.0/src_plugins/lib_compat_help/elem_rot.h
Examining data/pcb-rnd-2.3.0/src_plugins/lib_compat_help/media.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_compat_help/subc_help.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_compat_help/layer_compat.h
Examining data/pcb-rnd-2.3.0/src_plugins/lib_compat_help/elem_rot.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_stat/stat.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_netmap/placement.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_netmap/netmap.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_netmap/netmap.h
Examining data/pcb-rnd-2.3.0/src_plugins/lib_netmap/placement.h
Examining data/pcb-rnd-2.3.0/src_plugins/diag/diag.c
Examining data/pcb-rnd-2.3.0/src_plugins/diag/diag_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/diag/integrity.c
Examining data/pcb-rnd-2.3.0/src_plugins/diag/diag_conf.c
Examining data/pcb-rnd-2.3.0/src_plugins/diag/integrity.h
Examining data/pcb-rnd-2.3.0/src_plugins/asm/asm.c
Examining data/pcb-rnd-2.3.0/src_plugins/asm/asm_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/acompnet/meshgraph.c
Examining data/pcb-rnd-2.3.0/src_plugins/acompnet/acompnet.c
Examining data/pcb-rnd-2.3.0/src_plugins/acompnet/meshgraph.h
Examining data/pcb-rnd-2.3.0/src_plugins/shape/shape.c
Examining data/pcb-rnd-2.3.0/src_plugins/shape/shape.h
Examining data/pcb-rnd-2.3.0/src_plugins/shape/shape_dialog.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_dsn/dsn.c
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_insert.c
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_insert.h
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_remove.c
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_text.c
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_thermal.h
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_rotate.c
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_copy.h
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_copy.c
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_poly.h
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_arc.h
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_via.h
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_line.c
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_std.c
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_poly.c
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_polyhole.h
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_rectangle.h
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_lock.c
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_lock.h
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_via.c
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_buffer.h
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_move.h
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_rectangle.c
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_text.h
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_move.c
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_arrow.c
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_polyhole.c
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_rotate.h
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_buffer.c
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_line.h
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_arc.c
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_arrow.h
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_remove.h
Examining data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_thermal.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_polyhelp/topoly.h
Examining data/pcb-rnd-2.3.0/src_plugins/lib_polyhelp/triangulate.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_polyhelp/triangulate.h
Examining data/pcb-rnd-2.3.0/src_plugins/lib_polyhelp/polyhelp.h
Examining data/pcb-rnd-2.3.0/src_plugins/lib_polyhelp/polyhelp.c
Examining data/pcb-rnd-2.3.0/src_plugins/lib_polyhelp/topoly.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_autotrax/write.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_autotrax/write.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_autotrax/read.h
Examining data/pcb-rnd-2.3.0/src_plugins/io_autotrax/read.c
Examining data/pcb-rnd-2.3.0/src_plugins/io_autotrax/io_autotrax.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_dxf/lht_template.h
Examining data/pcb-rnd-2.3.0/src_plugins/export_dxf/dxf.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_dxf/dxf_draw.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_dxf/lht_template.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_stl/export_stl.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_stl/stl_models.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_stl/test_load/main.c
Examining data/pcb-rnd-2.3.0/src_plugins/export_stl/test_load/safe_fs.h
Examining data/pcb-rnd-2.3.0/src_plugins/export_stl/test_load/config.h
Examining data/pcb-rnd-2.3.0/src_plugins/export_stl/test_load/error.h
Examining data/pcb-rnd-2.3.0/src_plugins/ar_extern/ar_extern.c
Examining data/pcb-rnd-2.3.0/src_plugins/ar_extern/e_route-rnd.c
Examining data/pcb-rnd-2.3.0/src_plugins/ar_extern/ar_extern_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/ar_extern/dlg_extroute.c
Examining data/pcb-rnd-2.3.0/src_plugins/draw_fab/draw_fab.c
Examining data/pcb-rnd-2.3.0/src_plugins/draw_fab/draw_fab_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/smartdisperse/smartdisperse.c
Examining data/pcb-rnd-2.3.0/src_plugins/autoplace/autoplace.h
Examining data/pcb-rnd-2.3.0/src_plugins/autoplace/autoplace.c
Examining data/pcb-rnd-2.3.0/src_plugins/autoplace/action.c
Examining data/pcb-rnd-2.3.0/src_plugins/report/drill.h
Examining data/pcb-rnd-2.3.0/src_plugins/report/drill.c
Examining data/pcb-rnd-2.3.0/src_plugins/report/report_conf.h
Examining data/pcb-rnd-2.3.0/src_plugins/report/report.c
Examining data/pcb-rnd-2.3.0/src_plugins/report/report.h
Examining data/pcb-rnd-2.3.0/src_3rd/libuundo/uundo.c
Examining data/pcb-rnd-2.3.0/src_3rd/libuundo/uundo_debug.h
Examining data/pcb-rnd-2.3.0/src_3rd/libuundo/uundo_debug.c
Examining data/pcb-rnd-2.3.0/src_3rd/libuundo/uundo.h
Examining data/pcb-rnd-2.3.0/src_3rd/libcdtr/point.h
Examining data/pcb-rnd-2.3.0/src_3rd/libcdtr/cdt_test.c
Examining data/pcb-rnd-2.3.0/src_3rd/libcdtr/triangle.c
Examining data/pcb-rnd-2.3.0/src_3rd/libcdtr/triangle.h
Examining data/pcb-rnd-2.3.0/src_3rd/libcdtr/typedefs.h
Examining data/pcb-rnd-2.3.0/src_3rd/libcdtr/point.c
Examining data/pcb-rnd-2.3.0/src_3rd/libcdtr/edge.c
Examining data/pcb-rnd-2.3.0/src_3rd/libcdtr/list/list.h
Examining data/pcb-rnd-2.3.0/src_3rd/libcdtr/list/list.c
Examining data/pcb-rnd-2.3.0/src_3rd/libcdtr/list/testlist.c
Examining data/pcb-rnd-2.3.0/src_3rd/libcdtr/cdt.c
Examining data/pcb-rnd-2.3.0/src_3rd/libcdtr/cdt.h
Examining data/pcb-rnd-2.3.0/src_3rd/libcdtr/edge.h
Examining data/pcb-rnd-2.3.0/src_3rd/puplug/libs_bu.c
Examining data/pcb-rnd-2.3.0/src_3rd/puplug/scconfig_hooks.h
Examining data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c
Examining data/pcb-rnd-2.3.0/src_3rd/puplug/os_dep_fs.h
Examining data/pcb-rnd-2.3.0/src_3rd/puplug/puplug.h
Examining data/pcb-rnd-2.3.0/src_3rd/puplug/puplug.c
Examining data/pcb-rnd-2.3.0/src_3rd/puplug/os_dep.c
Examining data/pcb-rnd-2.3.0/src_3rd/puplug/libs.h
Examining data/pcb-rnd-2.3.0/src_3rd/puplug/os_dep.h
Examining data/pcb-rnd-2.3.0/src_3rd/puplug/error.h
Examining data/pcb-rnd-2.3.0/src_3rd/puplug/os_dep_fs.c
Examining data/pcb-rnd-2.3.0/src_3rd/puplug/libs.c
Examining data/pcb-rnd-2.3.0/src_3rd/puplug/error.c
Examining data/pcb-rnd-2.3.0/src_3rd/puplug/libs_dep_parse.h
Examining data/pcb-rnd-2.3.0/src_3rd/puplug/libs_dep.c
Examining data/pcb-rnd-2.3.0/src_3rd/sphash/test.c
Examining data/pcb-rnd-2.3.0/src_3rd/sphash/sphash.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/plugin_3state.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/rnd_hook_detect.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/hooks_gui.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/hooks_common.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/stroke/stroke_conf.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/stroke/stroke.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_gl/stencil_gl.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_gl/hidgl.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_gl/stencil_gl.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_gl/draw_gl.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_gl/lib_hid_gl.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_gl/hidgl.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_gl/draw_gl.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/dlg_attr_misc.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/FillBox.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/wt_colorbtn.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/lesstif.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/main.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/FillBox.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/xm_tree_table_pixmaps.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/wt_preview.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/wt_xpm.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/dlg_attr_tree.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/wt_colorbtn.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/wt_preview.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/mouse.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/Pages.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/ltf_stdarg.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/dlg_fileselect.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/ltf_stdarg.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/wt_xpm.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/Pages.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/PagesP.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/dlg_fileselect.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/menu.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/xm_tree_table_priv.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/xm_tree_table_widget.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/pxm_helper.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/dialogs.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/xm_tree_table_widget.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/xincludes.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/FillBoxP.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/dlg_attr_box.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/xm_tree_table_priv.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/bu_dwg_tooltip.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/dlg_attr_misc.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/lib_gtk_common.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/bu_dwg_tooltip.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/ui_zoompan.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/in_keyboard.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/glue_hid.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/glue_common.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/dlg_topwin.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/bu_menu.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/util_listener.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/wt_trunc_text.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/ui_crosshair.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/util_timer.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/wt_preview.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/bu_command.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/hid_gtk_conf.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/ui_crosshair.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/util_listener.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/dlg_attr_tree.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/util_watch.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/wt_preview.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/coord_conv.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/wt_trunc_text.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/dlg_attr_txt.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/util_watch.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/lib_gtk_config.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/dlg_fileselect.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/lib_gtk_config.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/dlg_attribute.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/bu_command.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/pcb_gtk.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/glue_common.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/compat.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/ui_zoompan.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/dlg_topwin.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/glue_hid.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/in_keyboard.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/dlg_fileselect.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/in_mouse.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/in_mouse.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/dlg_attribute.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/util_timer.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/dlg_attr_box.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/bu_menu.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/menu_helper.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/grid_menu.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/xpm.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/lib_hid_common.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/act_dad.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/cli_history.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/menu_helper.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/cli_history.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/lead_user.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/xpm.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/toolbar.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/lead_user.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/dialogs_conf.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/dlg_comm_m.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/dlg_log.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/dlg_log.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/dad_markup.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/act_dad.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/toolbar.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/zoompan.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/place.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/dlg_comm_m.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/place.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/grid_menu.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/lib_hid_common.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/clip.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/zoompan.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_gtk2_gdk/gtkhid-gdk.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_gtk2_gdk/gtkhid-main.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/irc/irc.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_gtk2_gl/gtkhid-gl.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_gtk2_gl/gtkhid-main.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_remote/remote.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_remote/proto.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_remote/proto.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_remote/proto_lowcommon.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_remote/proto_lowparse.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_remote/proto_lowsend.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_remote/proto_lowdbg.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/loghid/loghid.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/loghid/hid-logger.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/loghid/hid-logger.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_portynet/lib_portynet.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_wget/lib_wget.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_wget/lib_wget.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gensexpr/lib_gensexpr.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_batch/batch.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/pcb_compat.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/list_conf.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/unit.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/plugins.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/safe_fs.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/list_conf.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_lrealpath.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_cfg_action.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/gui_act.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_dad_spin.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hidlib.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_dad_unit.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/color.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_init.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/vtc0.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/box.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_lrealpath.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/color_cache.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_bool.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_init.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_cc.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_fs.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/pcb-printf.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/funchash.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_misc.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_cfg.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/tool.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/safe_fs_dir.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_bool.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/grid.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_menu.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_cfg_input.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/grid.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/pcb_bool.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf_regfile.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_dlg.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_attrib.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_cfg_input.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_dad_tree.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/safe_fs.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/paths.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf_hid.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_attrib.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/box.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/vtc0.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_dad.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_dad_unit.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_dad.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/plugins.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/globalconst.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/event.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/rotate.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/heap.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_inlines.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/actions.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/paths.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/error.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/main_act.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/global_typedefs.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_nogui.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/event.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_dad_spin.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_cfg_action.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/heap.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/error.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/pixmap.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_nogui.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_misc.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_cfg.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf_hid.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/fptr_cast.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/base64.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_menu.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/base64.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/funchash_core_list.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/pixmap.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/funchash_core.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hidlib_conf.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/math_helper.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/fptr_cast.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/funchash.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_fs.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/unit.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/tool.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/misc_util.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/misc_util.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/file_loaded.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_dad_tree.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/color.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf_act.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/actions.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hidlib.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/hidlib_conf.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/core/file_loaded.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/poly/offset.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/poly/polygon1_gen.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/poly/polyarea.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/poly/polyarea.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/poly/rtree2_compat.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/poly/rtree.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/poly/self_isc.c
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/poly/polygon1_gen.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/poly/offset.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/poly/self_isc.h
Examining data/pcb-rnd-2.3.0/src_3rd/librnd/poly/rtree.c
Examining data/pcb-rnd-2.3.0/src_3rd/liblhtpers/lhtpers.h
Examining data/pcb-rnd-2.3.0/src_3rd/liblhtpers/pers_hash.c
Examining data/pcb-rnd-2.3.0/src_3rd/liblhtpers/tests/perstest.c
Examining data/pcb-rnd-2.3.0/src_3rd/liblhtpers/lhtpers.c
Examining data/pcb-rnd-2.3.0/src_3rd/liblhtpers/output.c
Examining data/pcb-rnd-2.3.0/src_3rd/liblhtpers/pers_text.c
Examining data/pcb-rnd-2.3.0/src_3rd/liblhtpers/pers_table.c
Examining data/pcb-rnd-2.3.0/src_3rd/liblhtpers/pers_list.c
Examining data/pcb-rnd-2.3.0/src_3rd/libuhpgl/examples/dump_hpgl.c
Examining data/pcb-rnd-2.3.0/src_3rd/libuhpgl/uhpgl_math.h
Examining data/pcb-rnd-2.3.0/src_3rd/libuhpgl/libuhpgl.h
Examining data/pcb-rnd-2.3.0/src_3rd/libuhpgl/parse.h
Examining data/pcb-rnd-2.3.0/src_3rd/libuhpgl/parse.c
Examining data/pcb-rnd-2.3.0/src_3rd/libuhpgl/arc_iterate.h
Examining data/pcb-rnd-2.3.0/src_3rd/liblihata/tree_table.c
Examining data/pcb-rnd-2.3.0/src_3rd/liblihata/parser.h
Examining data/pcb-rnd-2.3.0/src_3rd/liblihata/lihata.c
Examining data/pcb-rnd-2.3.0/src_3rd/liblihata/test_tree.c
Examining data/pcb-rnd-2.3.0/src_3rd/liblihata/test_dom.c
Examining data/pcb-rnd-2.3.0/src_3rd/liblihata/dom_internal.h
Examining data/pcb-rnd-2.3.0/src_3rd/liblihata/tree.h
Examining data/pcb-rnd-2.3.0/src_3rd/liblihata/dom.c
Examining data/pcb-rnd-2.3.0/src_3rd/liblihata/tree_hash.c
Examining data/pcb-rnd-2.3.0/src_3rd/liblihata/hash_str.c
Examining data/pcb-rnd-2.3.0/src_3rd/liblihata/dom_table.c
Examining data/pcb-rnd-2.3.0/src_3rd/liblihata/dom.h
Examining data/pcb-rnd-2.3.0/src_3rd/liblihata/tree_path.c
Examining data/pcb-rnd-2.3.0/src_3rd/liblihata/tree_symlink.c
Examining data/pcb-rnd-2.3.0/src_3rd/liblihata/tree_list.c
Examining data/pcb-rnd-2.3.0/src_3rd/liblihata/dom_hash.c
Examining data/pcb-rnd-2.3.0/src_3rd/liblihata/dom_list.c
Examining data/pcb-rnd-2.3.0/src_3rd/liblihata/lihata.h
Examining data/pcb-rnd-2.3.0/src_3rd/liblihata/test_parser.c
Examining data/pcb-rnd-2.3.0/src_3rd/liblihata/tree.c
Examining data/pcb-rnd-2.3.0/src_3rd/liblihata/hash_str.h
Examining data/pcb-rnd-2.3.0/src_3rd/liblihata/parser.c
Examining data/pcb-rnd-2.3.0/src_3rd/libuirc/main.c
Examining data/pcb-rnd-2.3.0/src_3rd/libuirc/libuirc.c
Examining data/pcb-rnd-2.3.0/src_3rd/libuirc/libuirc.h
Examining data/pcb-rnd-2.3.0/src_3rd/genht/htpi.c
Examining data/pcb-rnd-2.3.0/src_3rd/genht/htsi.c
Examining data/pcb-rnd-2.3.0/src_3rd/genht/htpi.h
Examining data/pcb-rnd-2.3.0/src_3rd/genht/mainsi.c
Examining data/pcb-rnd-2.3.0/src_3rd/genht/hash.c
Examining data/pcb-rnd-2.3.0/src_3rd/genht/siphash24.c
Examining data/pcb-rnd-2.3.0/src_3rd/genht/hash.h
Examining data/pcb-rnd-2.3.0/src_3rd/genht/htss.c
Examining data/pcb-rnd-2.3.0/src_3rd/genht/siphash24.h
Examining data/pcb-rnd-2.3.0/src_3rd/genht/htip.c
Examining data/pcb-rnd-2.3.0/src_3rd/genht/htsp.h
Examining data/pcb-rnd-2.3.0/src_3rd/genht/ht.c
Examining data/pcb-rnd-2.3.0/src_3rd/genht/ver_edit.c
Examining data/pcb-rnd-2.3.0/src_3rd/genht/ht_inlines.h
Examining data/pcb-rnd-2.3.0/src_3rd/genht/htpp.c
Examining data/pcb-rnd-2.3.0/src_3rd/genht/htpp.h
Examining data/pcb-rnd-2.3.0/src_3rd/genht/htss.h
Examining data/pcb-rnd-2.3.0/src_3rd/genht/ht.h
Examining data/pcb-rnd-2.3.0/src_3rd/genht/htsp.c
Examining data/pcb-rnd-2.3.0/src_3rd/genht/htip.h
Examining data/pcb-rnd-2.3.0/src_3rd/genht/ht_utils.h
Examining data/pcb-rnd-2.3.0/src_3rd/genht/htsi.h
Examining data/pcb-rnd-2.3.0/src_3rd/libfungwbind/c/fungw_c.h
Examining data/pcb-rnd-2.3.0/src_3rd/libfungwbind/c/fungw_c.c
Examining data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c
Examining data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/fungw_fawk.c
Examining data/pcb-rnd-2.3.0/src_3rd/genrtree/genrtree_api.h
Examining data/pcb-rnd-2.3.0/src_3rd/genrtree/genrtree_delete.h
Examining data/pcb-rnd-2.3.0/src_3rd/genrtree/genrtree_search.h
Examining data/pcb-rnd-2.3.0/src_3rd/genrtree/genrtree_impl.h
Examining data/pcb-rnd-2.3.0/src_3rd/genrtree/genrtree_debug.h
Examining data/pcb-rnd-2.3.0/src_3rd/fast89-poly2tri/fast89_poly2tri.h
Examining data/pcb-rnd-2.3.0/src_3rd/libminuid/libminuid.c
Examining data/pcb-rnd-2.3.0/src_3rd/libminuid/libminuid.h
Examining data/pcb-rnd-2.3.0/src_3rd/libminuid/base64.h
Examining data/pcb-rnd-2.3.0/src_3rd/libporty_net/hooks_net.c
Examining data/pcb-rnd-2.3.0/src_3rd/libporty_net/libportytcp4.c
Examining data/pcb-rnd-2.3.0/src_3rd/libporty_net/libportytcp4.h
Examining data/pcb-rnd-2.3.0/src_3rd/genlist/genlistalloc.c
Examining data/pcb-rnd-2.3.0/src_3rd/genlist/example_ad.c
Examining data/pcb-rnd-2.3.0/src_3rd/genlist/genadlist.h
Examining data/pcb-rnd-2.3.0/src_3rd/genlist/gendlist.h
Examining data/pcb-rnd-2.3.0/src_3rd/genlist/genadlist.c
Examining data/pcb-rnd-2.3.0/src_3rd/genlist/example_d.c
Examining data/pcb-rnd-2.3.0/src_3rd/genlist/gentdlist_undef.h
Examining data/pcb-rnd-2.3.0/src_3rd/genlist/gentdlist_impl.h
Examining data/pcb-rnd-2.3.0/src_3rd/genlist/genlistalloc.h
Examining data/pcb-rnd-2.3.0/src_3rd/genlist/gentdlist_impl.c
Examining data/pcb-rnd-2.3.0/src_3rd/libfungw/scconfig_hooks.h
Examining data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw_call.c
Examining data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw_debug.c
Examining data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw_conv.h
Examining data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw_conv.c
Examining data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw_ptr.c
Examining data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw.h
Examining data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw.c
Examining data/pcb-rnd-2.3.0/src_3rd/gensexpr/gensexpr_impl.c
Examining data/pcb-rnd-2.3.0/src_3rd/gensexpr/gsx_parse.c
Examining data/pcb-rnd-2.3.0/src_3rd/gensexpr/gsx_parse.h
Examining data/pcb-rnd-2.3.0/src_3rd/gensexpr/gsxnl.h
Examining data/pcb-rnd-2.3.0/src_3rd/gensexpr/gensexpr_impl.h
Examining data/pcb-rnd-2.3.0/src_3rd/gensexpr/gsxl.c
Examining data/pcb-rnd-2.3.0/src_3rd/gensexpr/gsxl.h
Examining data/pcb-rnd-2.3.0/src_3rd/gensexpr/gsxnl.c
Examining data/pcb-rnd-2.3.0/src_3rd/qparse/example_static.c
Examining data/pcb-rnd-2.3.0/src_3rd/qparse/example_dynamic.c
Examining data/pcb-rnd-2.3.0/src_3rd/qparse/qparse.c
Examining data/pcb-rnd-2.3.0/src_3rd/qparse/qparse.h
Examining data/pcb-rnd-2.3.0/src_3rd/genvector/gds_char.c
Examining data/pcb-rnd-2.3.0/src_3rd/genvector/vtp0.h
Examining data/pcb-rnd-2.3.0/src_3rd/genvector/gds_wchar.h
Examining data/pcb-rnd-2.3.0/src_3rd/genvector/genvector_impl.c
Examining data/pcb-rnd-2.3.0/src_3rd/genvector/vti0.h
Examining data/pcb-rnd-2.3.0/src_3rd/genvector/vti0.c
Examining data/pcb-rnd-2.3.0/src_3rd/genvector/genvector_impl.h
Examining data/pcb-rnd-2.3.0/src_3rd/genvector/vtd0.c
Examining data/pcb-rnd-2.3.0/src_3rd/genvector/vtii.h
Examining data/pcb-rnd-2.3.0/src_3rd/genvector/gds_char.h
Examining data/pcb-rnd-2.3.0/src_3rd/genvector/gds_wchar.c
Examining data/pcb-rnd-2.3.0/src_3rd/genvector/genvector_undef.h
Examining data/pcb-rnd-2.3.0/src_3rd/genvector/vtl0.c
Examining data/pcb-rnd-2.3.0/src_3rd/genvector/vts0.h
Examining data/pcb-rnd-2.3.0/src_3rd/genvector/vtp0.c
Examining data/pcb-rnd-2.3.0/src_3rd/genvector/vtii.c
Examining data/pcb-rnd-2.3.0/src_3rd/genvector/vtd0.h
Examining data/pcb-rnd-2.3.0/src_3rd/genvector/vts0.c
Examining data/pcb-rnd-2.3.0/src_3rd/genvector/vtl0.h
Examining data/pcb-rnd-2.3.0/src_3rd/genregex/regex_sei.h
Examining data/pcb-rnd-2.3.0/src_3rd/genregex/regex_se.c
Examining data/pcb-rnd-2.3.0/src_3rd/genregex/regex_templ.h
Examining data/pcb-rnd-2.3.0/src_3rd/genregex/regex.c
Examining data/pcb-rnd-2.3.0/src_3rd/genregex/regex_se.h
Examining data/pcb-rnd-2.3.0/src_3rd/genregex/regex_sei.c
Examining data/pcb-rnd-2.3.0/src_3rd/genregex/regex_templ.c
Examining data/pcb-rnd-2.3.0/src_3rd/genregex/tester_main.c
Examining data/pcb-rnd-2.3.0/src_3rd/genregex/regex_be.c
Examining data/pcb-rnd-2.3.0/src_3rd/genregex/regex_sti.c
Examining data/pcb-rnd-2.3.0/src_3rd/genregex/regex_bti.h
Examining data/pcb-rnd-2.3.0/src_3rd/genregex/regex_bt.c
Examining data/pcb-rnd-2.3.0/src_3rd/genregex/regex_bt.h
Examining data/pcb-rnd-2.3.0/src_3rd/genregex/regex_bti.c
Examining data/pcb-rnd-2.3.0/src_3rd/genregex/tester.c
Examining data/pcb-rnd-2.3.0/src_3rd/genregex/regex_bei.h
Examining data/pcb-rnd-2.3.0/src_3rd/genregex/regex_be.h
Examining data/pcb-rnd-2.3.0/src_3rd/genregex/regex_bei.c
Examining data/pcb-rnd-2.3.0/src_3rd/genregex/regex_st.c
Examining data/pcb-rnd-2.3.0/src_3rd/genregex/regex.h
Examining data/pcb-rnd-2.3.0/src_3rd/genregex/regex_sti.h
Examining data/pcb-rnd-2.3.0/src_3rd/genregex/regex_st.h
Examining data/pcb-rnd-2.3.0/src_3rd/libulzw/libulzw_comp.c
Examining data/pcb-rnd-2.3.0/src_3rd/libulzw/libulzw_decomp.c
Examining data/pcb-rnd-2.3.0/src_3rd/libulzw/libulzw.h

FINAL RESULTS:

data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:730:14:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
	const char *chmod;
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:745:36:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
		report(" user provided (%s)...", chmod);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:746:29:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
		if (test_chmodx(logdepth, chmod)) return 0;
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:421:2:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
	chmod(dst_name, st.st_mode); /* this may fail on windows or on strange FS, don't check the return value */
data/pcb-rnd-2.3.0/scconfig/hooks.c:293:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(apiver, version);
data/pcb-rnd-2.3.0/scconfig/hooks.c:301:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(version_major, version);
data/pcb-rnd-2.3.0/scconfig/hooks.c:354:29:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define plugin_header(sect) printf(sect);
data/pcb-rnd-2.3.0/scconfig/src/c99/find_c99.c:646:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(test_c, test_c_template, "char", "", det_target);
data/pcb-rnd-2.3.0/scconfig/src/c99/find_c99.c:648:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(test_c, test_c_template, "wchar_t", "L", det_target);
data/pcb-rnd-2.3.0/scconfig/src/c99/find_c99.c:650:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(key, "std/c99/%s", det_target);
data/pcb-rnd-2.3.0/scconfig/src/default/db.c:310:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, "%s/%s", db_cwd, key);
data/pcb-rnd-2.3.0/scconfig/src/default/db.c:407:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(buff, prefix);
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:198:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(name, "cc/argstd/%s", (*flg)+1);
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:421:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_tmp, fattr);
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:422:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(path, "cc/func_attr/%s/presents", fattr);
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:461:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_tmp, dspec);
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:462:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(path, "cc/declspec/%s/presents", dspec);
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:513:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_template, dspec);
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:795:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cflags_c, "%s -c %s", cflags, fpic);
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:804:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(test_host_app, test_host, ld_include, libname_dyn);
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:893:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_lib, test_lib_template, dspec_dllexport);
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:914:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(test_app, test_app_template, dspec_dllimport);
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:971:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(dll_ldflags, "-shared %s,%s", get("cc/wloutimplib"), dll_implib_name);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:230:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(test_c, test_c_templ, access_includes, *n);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:232:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(nodename, "libs/fs/access/macros/%s", names[name][0]);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:287:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(test_c, test_c_templ, *n);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:289:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(nodename, "libs/fs/stat/macros/%s", names[name][0]);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:332:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(test_c, test_c_templ, names[name]);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:333:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(nodename, "libs/fs/stat/fields/%s/presents", names[name]);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:370:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(node, "libs/fs/%s", fn);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:371:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_in, fn);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:487:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_in, dir, ", 0755");
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:498:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_in, dir, ", 0755");
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:509:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_in, dir, "");
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:550:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_in, dir, ", 0755");
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:561:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_in, dir, "");
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:648:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_in, tmp);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:50:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "%s %s %s", command, src_esc, dst_esc);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:109:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "%s %s %s", command, src_esc, dst_esc);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:154:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "%s %s", command, dir_esc);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:159:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(file, "%s/test", dir);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:174:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "rmdir %s", dir_esc);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:215:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "%s %s", command, src_esc);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:251:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "%s ru %s %s", command, dst_esc, src_esc);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:253:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "%s t %s", command, dst_esc);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:296:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "%s r %s %s", ar, archive_esc, obj_esc);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:302:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "%s %s", command, archive_esc);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:336:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "%s -v \"t=blobb\" -f %s", command, script_esc);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:363:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "%s %s", command, fn_esc);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:391:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "%s \"s/l/1/g\" < %s", command, fn_esc);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:417:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "%s %s", command, tmp_esc);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:462:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "%s %s", command, fn_esc);
data/pcb-rnd-2.3.0/scconfig/src/default/find_io.c:141:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_, "fileno", "fileno", "fileno");
data/pcb-rnd-2.3.0/scconfig/src/default/find_io.c:147:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_, "fileno", "fileno", "fileno");
data/pcb-rnd-2.3.0/scconfig/src/default/find_io.c:154:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_, "_fileno", "_fileno", "_fileno");
data/pcb-rnd-2.3.0/scconfig/src/default/find_io.c:195:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(test_c, test_c_template, tmpf, *fn, *fn, *fn);
data/pcb-rnd-2.3.0/scconfig/src/default/find_libs.c:37:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(cflags,  cflagsf, dlc);
data/pcb-rnd-2.3.0/scconfig/src/default/find_libs.c:38:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(ldflags, ldflagsf, dlc, dlc);
data/pcb-rnd-2.3.0/scconfig/src/default/find_printf.c:37:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(buff, test_c, trying, trying);
data/pcb-rnd-2.3.0/scconfig/src/default/find_printf.c:55:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(buff, test_c, trying);
data/pcb-rnd-2.3.0/scconfig/src/default/find_proc.c:166:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(test_c, test_c_in, inc);
data/pcb-rnd-2.3.0/scconfig/src/default/find_proc.c:170:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(test_c, test_c_in, "");
data/pcb-rnd-2.3.0/scconfig/src/default/find_signal.c:102:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(path, prefix);
data/pcb-rnd-2.3.0/scconfig/src/default/find_signal.c:110:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(test_c, test_c_exists, *name);
data/pcb-rnd-2.3.0/scconfig/src/default/find_signal.c:111:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(pathend, *name);
data/pcb-rnd-2.3.0/scconfig/src/default/find_signal.c:123:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(test_c, test_c_terms, *name);
data/pcb-rnd-2.3.0/scconfig/src/default/find_signal.c:124:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(pathend, "%s/terminates", *name);
data/pcb-rnd-2.3.0/scconfig/src/default/find_sys.c:136:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(test_c_blind, test_c_blind_template, endians1[index], endians1[index]);
data/pcb-rnd-2.3.0/scconfig/src/default/find_sys.c:383:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "%s %s%s%s", shell, q, test, q);
data/pcb-rnd-2.3.0/scconfig/src/default/find_time.c:146:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, timegm_test_c_template, "timegm");
data/pcb-rnd-2.3.0/scconfig/src/default/find_time.c:165:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, timegm_test_c_template, "_mkgmtime");
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:52:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(test_c, inc);
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:57:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(start, test_c_template, type);
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:171:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(path, path_template, n, 'u');
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:178:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(path, path_template, n, 's');
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:187:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(path, path_template_f, n);
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:260:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(node, "%s/%s", prefix, typ);
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:279:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(test_c, test_c_include, define, *include, typ);
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:305:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_broken, define, *include, typ);
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:329:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(test_c, test_c_size, define, *include, typ);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_compile.c:55:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(output + len + 1, input + 1);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_compile.c:102:8:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	ret = system(cmdline);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_compile.c:242:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "%s %s >%s 2>>%s", emu, cmd_, fn_out_esc, temp_out_esc);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_compile.c:247:8:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	ret = system(cmd);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_compile.c:288:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(cmd, "%s %s \"%s\"", emu, shell, cmd_);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_compile.c:290:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(cmd, "%s %s %s", emu, shell, cmd_);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_compile.c:326:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "%s %s", interpreter, temp);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_file.c:66:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(s, "%sscc_%u%s", tmp, rn, suffix);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_file.c:70:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(cmd, "%s %s", mkdir, s_esc);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_file.c:99:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(s, "%sscc_%u%s", tmp, rn, suffix);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_file.c:170:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, "cd %s", path_esc);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_file.c:194:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(path, "%s/%s", dir, file);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_filelist.c:49:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "%s %s", rm, dir_esc);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_filelist.c:69:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(fn, "%s%sfile%d", dir, get("sys/path_sep"), n+1);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_filelist.c:87:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(fn, "%s%sdir%d", dir, get("sys/path_sep"), n+1);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_filelist.c:89:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(cmd, "%s %s", mkdir, fn_esc);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_filelist.c:220:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(cmd, list_cmd, dir);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_pkg_config.c:39:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(cmd, "%s --cflags %s", confname, pkgname);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_pkg_config.c:52:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(cmd, "%s --libs %s", confname, pkgname);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_pkg_config.c:94:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(cmd, "%s --modversion %s", confname, pkgname);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:30:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(c+l, test_c_in);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:64:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tmp, "%s/includes", prefix);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:70:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tmp, "%s/cflags", prefix);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:76:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tmp, "%s/ldflags", prefix);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:86:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tmp, "%s/presents", prefix);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:99:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(apath_end, #node); \
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:149:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	l = sprintf(apath, "/arg/icl/%s/", prefix); apath_end = apath+l;
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:154:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	l = sprintf(apath, "/arg/icl/%s/%s/", db_cwd, prefix); apath_end = apath+l;
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:163:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(apath, "%s/icl/all_manual_result", prefix);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:272:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, "%s/presents", prefix);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:348:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		case 'l': sprintf(path, "/arg/icl/%s/ldflags", key+8); break;
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:349:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		case 'c': sprintf(path, "/arg/icl/%s/cflags", key+7); break;
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:350:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		case 'i': sprintf(path, "/arg/icl/%s/includes", key+9); break;
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:351:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		case 'p': sprintf(path, "/arg/icl/%s/prefix", key+7); break;
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:388:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_in, structn, fieldn);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:392:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(test_c, "%s/sizeof", prefix);
data/pcb-rnd-2.3.0/scconfig/src/default/log.c:58:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(logfile, format, ap);
data/pcb-rnd-2.3.0/scconfig/src/default/log.c:69:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, format, ap);
data/pcb-rnd-2.3.0/scconfig/src/default/log.c:75:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(logfile, format, ap);
data/pcb-rnd-2.3.0/scconfig/src/default/log.c:86:2:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vprintf(format, ap);
data/pcb-rnd-2.3.0/scconfig/src/default/log.c:93:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(logfile, format, ap);
data/pcb-rnd-2.3.0/scconfig/src/generator/generator.c:88:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(cmd_buff, TOP.cmd);
data/pcb-rnd-2.3.0/scconfig/src/generator/generator.c:459:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(buff, val);
data/pcb-rnd-2.3.0/scconfig/src/generator/generator.c:529:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(path, arr);
data/pcb-rnd-2.3.0/scconfig/src/gui/find_gl.c:63:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(test_c, test_c_templ, *id);
data/pcb-rnd-2.3.0/scconfig/src/gui/find_gl.c:77:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
				sprintf(test_c, test_c_templ, *id);
data/pcb-rnd-2.3.0/scconfig/src/gui/find_gl.c:128:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_templ, ipr, ipr);
data/pcb-rnd-2.3.0/scconfig/src/gui/find_gl.c:220:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(freeglut, "#include <%s/freeglut.h>", ipr);
data/pcb-rnd-2.3.0/scconfig/src/gui/find_gl.c:227:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(freeglut, "#include <windows.h>\n#include <%s/glut.h>", ipr);
data/pcb-rnd-2.3.0/scconfig/src/gui/find_gtk2.c:147:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_, "GDK_KEY_Tab");
data/pcb-rnd-2.3.0/scconfig/src/gui/find_gtk2.c:154:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_, "GDK_Tab");
data/pcb-rnd-2.3.0/scconfig/src/math/find_fpenan.c:224:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_temp, inc);
data/pcb-rnd-2.3.0/scconfig/src/math/find_fpenan.c:240:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(cmd, test[0], test_bin_esc);
data/pcb-rnd-2.3.0/scconfig/src/math/find_fpenan.c:243:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(cmd, "libs/math/nanop/%s", test[2]);
data/pcb-rnd-2.3.0/scconfig/src/math/find_func.c:47:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_template, cond);
data/pcb-rnd-2.3.0/scconfig/src/math/find_func.c:48:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(node_name, "libs/math/%s", fname);
data/pcb-rnd-2.3.0/scconfig/src/math/find_mfunc_cc.c:53:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_templ, values, func);
data/pcb-rnd-2.3.0/scconfig/src/math/find_mfunc_cc.c:75:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(cmd, "%s %d", fn_esc, n);
data/pcb-rnd-2.3.0/scconfig/src/math/find_mfunc_cc.c:135:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(node_name, "libs/math/cc/%s/%s/return", func, node_names[n]);
data/pcb-rnd-2.3.0/scconfig/src/math/find_mfunc_cc.c:137:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(node_name, "libs/math/cc/%s/%s/errno", func, node_names[n]);
data/pcb-rnd-2.3.0/scconfig/src/math/find_mfunc_cc.c:146:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(node_name, "libs/math/cc/%s/presents", func);
data/pcb-rnd-2.3.0/scconfig/src/menulib/hrl_test.c:16:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(newline, "%s%s%c%s", *line, insert, c, (*line)+*cursor+1);
data/pcb-rnd-2.3.0/scconfig/src/menulib/vt100.c:40:8:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	len = sprintf(s, ESC "[%d;%df", row, col);
data/pcb-rnd-2.3.0/scconfig/src/parsgen/find_parsgen.c:55:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "flex %s", temp_in_esc);
data/pcb-rnd-2.3.0/scconfig/src/parsgen/find_parsgen.c:101:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(bisfile, temp_in);
data/pcb-rnd-2.3.0/scconfig/src/parsgen/find_parsgen.c:111:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "bison %s", temp_in_esc);
data/pcb-rnd-2.3.0/scconfig/src/parsgen/find_parsgen.c:149:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(bisfile, temp_in);
data/pcb-rnd-2.3.0/scconfig/src/parsgen/find_parsgen.c:159:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "byaccic -o %s %s", bisfile, temp_in_esc);
data/pcb-rnd-2.3.0/scconfig/src/parsgen/find_parsgen.c:209:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "ureglex -l %s -c %s", temp_in_esc, lexfile);
data/pcb-rnd-2.3.0/scconfig/src/posix/find_dev.c:46:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_template, dev_name);
data/pcb-rnd-2.3.0/scconfig/src/posix/find_dev.c:47:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(key, "libs/posix/dev/%s", dev_name);
data/pcb-rnd-2.3.0/scconfig/src/posix/find_fs.c:56:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_in, tmpf);
data/pcb-rnd-2.3.0/scconfig/src/posix/find_fs.c:107:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_template, tmpf);
data/pcb-rnd-2.3.0/scconfig/src/posix/find_fs.c:171:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_template, tmpf);
data/pcb-rnd-2.3.0/scconfig/src/posix/find_proc.c:47:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(key, "libs/posix/proc/%s", func);
data/pcb-rnd-2.3.0/scconfig/src/posix/find_proc.c:48:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_template, func, arg, rtype, badval);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_gpmi.c:65:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(cmd, "%s --version", *cfg);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_gpmi.c:73:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(cmd, "%s --id", *cfg);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_python.c:63:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_in, vermajor);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_ruby.c:37:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(tmp, "%s/%s", basedir, files[n]);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_ruby.c:42:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tmp, "%s/%s/%s/ruby.h", basedir, files[n], ifiles[m]);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_ruby.c:45:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(tmp, "-I%s/%s/%s", basedir, files[n], ifiles[m]);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_ruby.c:47:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(ldflags, "-lruby%s", files[n]);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_tcl.c:116:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(cmd, "%s %s", *tclsh, temp);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_tcl.c:121:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(cmd, "#!/bin/sh\n. %s\necho $TCL_INCLUDE_SPEC\necho $TCL_LIB_SPEC\n", out);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_tcl.c:125:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(out, "chmod +x %s", temp2);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_tcl.c:126:4:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			system(out);
data/pcb-rnd-2.3.0/scconfig/src/scripts/scripts.c:63:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(nodename, "libs/script/%s", language);
data/pcb-rnd-2.3.0/scconfig/src/scripts/scripts.c:64:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(deflink, "-l%s", language);
data/pcb-rnd-2.3.0/scconfig/src/scripts/scripts.c:72:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(ldflags, "%s -l%s", ldflags_base, files[n]);
data/pcb-rnd-2.3.0/scconfig/src/scripts/scripts.c:74:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(cflags, "-I%s/%s", basedir, files[n]);
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:185:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(test_c, test_c_socketpair,  *family, "SOCK_STREAM");
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:241:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(test_c, test_c_socket, t->domain, t->type);
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:242:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(node, "libs/socket/types/%s/%s", t->domain, t->type);
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:279:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_temp, "int", "");
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:289:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_temp, "u_long", "socket");
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:334:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_cf, get("libs/socket/ioctl/argtype"), get("libs/socket/ioctl/ioctl"));
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:342:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_cf, get("libs/socket/ioctl/argtype"), get("libs/socket/ioctl/ioctl"));
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:349:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_cf, get("libs/socket/ioctl/argtype"), get("libs/socket/ioctl/ioctl"));
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:617:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_lac, inc_dns, localhost(), test_lac_port++, "");
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:668:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_lac, inc_dns, localhost(), test_lac_port++, test_local);
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:715:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_lac, inc_dns, localhost(), test_lac_port++, test_local);
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:863:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(test_c, test_c_template, *typ);
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:864:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(nodeend, *typ);
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:899:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(node, "libs/socket/%s", typ);
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:905:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_template, typ);
data/pcb-rnd-2.3.0/scconfig/src/socket/socket.c:113:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tmp, "%s/cflags", prefix);
data/pcb-rnd-2.3.0/scconfig/src/socket/socket.c:115:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tmp, "%s/ldflags", prefix);
data/pcb-rnd-2.3.0/scconfig/src/socket/socket.c:117:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tmp, "%s/presents", prefix);
data/pcb-rnd-2.3.0/scconfig/src/socket/socket.c:131:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tmp, "%s/includes", prefix);
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tester.c:57:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr, fmt, (ctx->runtime_error_data == NULL ? "" : ctx->runtime_error_data));
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:60:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(stderr, fmt, (ctx->runtime_error_data == NULL ? "" : ctx->runtime_error_data));
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:301:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(buff, val);
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:518:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(err, "%s (%s) for %s", path, fn, mode);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/libfawk_sc_fawk.c:382:30:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 if (ctx->errbuff != NULL) { sprintf fmt; fawk_error(ctx, ctx->errbuff); } \
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/libfawk_sc_fawk.c:581:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(n == argc-1 ? "\n" : " ");
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/tmpfawk.c:122:14:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		PRINT_CELL(fprintf, f, cell);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/tmpfawk.c:123:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(f, n == argc-1 ? "" : " ");
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/tmpfawk.c:246:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(buff, val);
data/pcb-rnd-2.3.0/scconfig/src/tty/find_ioctl.c:64:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(nodeend, *ioc);
data/pcb-rnd-2.3.0/scconfig/src/tty/find_ioctl.c:65:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(test_c, test_c_template, *typ, *ioc);
data/pcb-rnd-2.3.0/scconfig/src/userpass/find_username.c:56:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(test_c, test_c_, call, arg);
data/pcb-rnd-2.3.0/scconfig/src/userpass/find_username.c:57:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(node, "libs/userpass/%s", call);
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:435:7:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		f = popen("pwd", "r");
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:506:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(end, p);
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:592:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "ln -s \"%s\" \"%s\"%s", full_src, dst, supp);
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:593:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	return system(cmd);
data/pcb-rnd-2.3.0/src/flag_str.c:226:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(msg, fmt, bp - orig_bp + 5, orig_bp, *bp);
data/pcb-rnd-2.3.0/src/flag_str.c:398:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
				sprintf(msg, fmt, flen, fp);
data/pcb-rnd-2.3.0/src/flag_str.c:488:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(bp, flagbits[i].name);
data/pcb-rnd-2.3.0/src/flag_str.c:503:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(bp, print_layer_list());
data/pcb-rnd-2.3.0/src/hid_cam.c:170:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(buf, pf);
data/pcb-rnd-2.3.0/src/hid_cam.c:181:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(buf, suffix);
data/pcb-rnd-2.3.0/src/main.c:137:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(tmps, "%s%s%s", p, RND_DIR_SEPARATOR_S, argv0);
data/pcb-rnd-2.3.0/src/main.c:176:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(exec_prefix, "%s%s%s", bindir, RND_DIR_SEPARATOR_S, BINDIR_TO_EXECPREFIX);
data/pcb-rnd-2.3.0/src/main_act.c:64:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, fmt, ap);
data/pcb-rnd-2.3.0/src/netlist.c:351:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(a->netname, netname);
data/pcb-rnd-2.3.0/src/netlist_act.c:79:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(pins[next], "%s-%s", subc->refdes, o->term);
data/pcb-rnd-2.3.0/src/obj_subc.c:2401:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(f->str, txt->TextString);
data/pcb-rnd-2.3.0/src/obj_term.c:207:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(r->str, old_term);
data/pcb-rnd-2.3.0/src/plug_io.c:894:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
		sprintf(filename, conf_core.rc.emergency_name, (long int)rnd_getpid());
data/pcb-rnd-2.3.0/src/route_style.c:98:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(routeStyle->name, Name);
data/pcb-rnd-2.3.0/src_3rd/genht/ver_edit.c:9:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(s, value); \
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:417:30:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 if (ctx->errbuff != NULL) { sprintf fmt; libfawk_error(ctx, ctx->errbuff, "<runtime>", ctx->code.code[ctx->ip].line, 0); } \
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:618:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  printf(n == argc-1 ? "\n" : " ");
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:684:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
   sprintf(buff, FAWK_NUM_PRINTF_FMT, cell->data.num);
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:1495:91:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  case FAWK_NUM: if (verbose) printf("NUM:{"FAWK_NUM_PRINTF_FMT"}", cell->data.num); else printf(FAWK_NUM_PRINTF_FMT, cell->data.num); return;
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/lhtpers.c:37:23:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#	define debug_printf printf
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/lhtpers.c:45:19:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#	define ilprintf fprintf
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/lhtpers.c:811:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(*errmsg, "%s (%s:%d.%d)\n", msg, infn, line+1, col+1);
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/tests/perstest.c:164:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(out, "%s.out", argv[1]);
data/pcb-rnd-2.3.0/src_3rd/liblihata/dom.c:750:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(*errmsg, "%s (%s:%d.%d)\n", msg, fn, line+1, col+1);
data/pcb-rnd-2.3.0/src_3rd/liblihata/dom.c:778:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(*errmsg, "can't open '%s' for read\n", fn);
data/pcb-rnd-2.3.0/src_3rd/liblihata/dom.c:811:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(*errmsg, "%s (%s:%d.%d)\n", msg, fn, line+1, col+1);
data/pcb-rnd-2.3.0/src_3rd/libporty_net/libportytcp4.c:204:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		ret = vsnprintf(buff, size, format, ap);
data/pcb-rnd-2.3.0/src_3rd/libporty_net/libportytcp4.c:232:8:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	len = vsprintf(buff, format, ap);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_fs.c:119:3:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execvp(argv[0], (char* const*) argv);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_fs.c:201:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	(void) strcat(mytmpdir, tmpdir);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_fs.c:202:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	(void) strcat(mytmpdir, RND_DIR_SEPARATOR_S);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_fs.c:203:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	(void) strcat(mytmpdir, TEMPLATE);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_fs.c:220:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	(void) strcat(tmpfile, mytmpdir);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_fs.c:221:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	(void) strcat(tmpfile, RND_DIR_SEPARATOR_S);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_fs.c:222:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	(void) strcat(tmpfile, name);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:287:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(fn, e->key);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:480:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(end+1, project_name);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:484:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(res, project_name);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:1693:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(arg+pl+1, arg_);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:1786:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(name, sc);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/funchash.c:131:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(new_key->key_buff, key);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_menu.c:822:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					strcpy((*p)+strlen(*p), fn);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_menu.c:895:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
 strcpy(path, menu_path);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:99:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(printf_spec_new, ", %sf", printf_spec);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:102:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(printf_spec_new, ", %s.%df", printf_spec, precision);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:108:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(out, fmt, val); \
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:599:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
					tmplen = sprintf(tmp, spec.array, va_arg(args, long));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:601:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
					tmplen = sprintf(tmp, spec.array, va_arg(args, int));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:613:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
					tmplen = sprintf(tmp, spec.array, va_arg(args, double), prec);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:616:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
					tmplen = sprintf(tmp, spec.array, va_arg(args, double));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:623:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
					tmplen = sprintf(tmp, spec.array, va_arg(args, wchar_t));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:625:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
					tmplen = sprintf(tmp, spec.array, va_arg(args, int));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:646:14:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
				tmplen = sprintf(tmp, spec.array, va_arg(args, int *));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:652:14:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
				tmplen = sprintf(tmp, spec.array, va_arg(args, void *));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:752:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
					tmplen = sprintf(tmp, spec.array, (double) va_arg(args, rnd_angle_t));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:761:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
					tmplen = sprintf(tmp, spec.array, 10*((double) va_arg(args, rnd_angle_t))); /* kicad legacy needs decidegrees */
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:768:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
					tmplen = sprintf(tmp, spec.array, va_arg(args, double));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/safe_fs.c:183:6:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	f = popen(cmd_exp, mode);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/safe_fs.c:205:8:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	res = system(cmd_exp);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/main.c:1695:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(stderr, dflt, par[0], par[1], par[2], par[3], par[4], par[5], par[6], par[7]);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/main.c:1762:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(tmpopt + 2, a->name);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/main.c:1767:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(tmpres + 1, a->name);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/xm_tree_table_priv.c:383:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(name_buf, widget_name);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/glue_common.c:65:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		system(cmd);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/lib_gtk_config.c:121:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(dirname, p[1]);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/place.c:169:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(path, BASEPATH);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/place.c:211:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(path, BASEPATH);
data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/hooks_common.h:167:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buff, "/local/pcb/%s/hidlib", plugin);
data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/hooks_common.h:174:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(buff, "/local/pcb/%s/hidlib", deps_on);
data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/hooks_common.h:178:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buff, "/local/pcb/%s/controls", plugin);
data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/hooks_common.h:180:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buff, "/local/pcb/%s/controls", deps_on);
data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/hooks_common.h:186:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buff, "WARNING: disabling (ex-buildin) %s because the %s is not enabled as a buildin...\n", plugin, deps_on);
data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/hooks_common.h:188:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buff, "disable-%s", plugin);
data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/hooks_common.h:195:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buff, "WARNING: disabling (ex-plugin) %s because the %s is not enabled as a buildin or plugin...\n", plugin, deps_on);
data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/hooks_common.h:197:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(buff, "disable-%s", plugin);
data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/hooks_common.h:224:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(buff, "/local/pcb/%s/controls", name); \
data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/hooks_common.h:242:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(buff, "/local/pcb/%s/hidlib", name); \
data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/hooks_common.h:301:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(pwanted, "/local/pcb/%s/explicit", name); \
data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/hooks_common.h:304:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(pgot, "/local/pcb/%s/controls", name); \
data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/rnd_hook_detect.h:23:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, "((1%s<<%d)-1)", postfix, want_coord_bits - 1);
data/pcb-rnd-2.3.0/src_3rd/libuundo/uundo_debug.c:57:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(msg, txt); \
data/pcb-rnd-2.3.0/src_3rd/puplug/error.c:151:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, "%s(): '%s': '%s'", from, msg, det);
data/pcb-rnd-2.3.0/src_3rd/puplug/libs.c:134:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(end, func);
data/pcb-rnd-2.3.0/src_3rd/puplug/libs.c:138:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(end, lib->name);
data/pcb-rnd-2.3.0/src_3rd/puplug/libs.c:405:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(name, cname); /* safe: cname is returned by readdir, must not be longer than PUP_PATH_MAX */
data/pcb-rnd-2.3.0/src_3rd/puplug/libs.c:412:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(path, "%s/%s", dirname, name);
data/pcb-rnd-2.3.0/src_3rd/puplug/libs_dep.c:50:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, "package %s conflicts package %s", who, with_whom);
data/pcb-rnd-2.3.0/src_3rd/puplug/libs_dep.c:146:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, "syntax error in %s: %s\n", (st->pup_path == NULL ? "<buildin>" :st->pup_path), msg);
data/pcb-rnd-2.3.0/src_3rd/puplug/os_dep.c:107:8:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	ret = vsprintf(buf, format, ap);
data/pcb-rnd-2.3.0/src_3rd/puplug/os_dep.h:70:23:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define pup_snprintf  snprintf
data/pcb-rnd-2.3.0/src_3rd/puplug/os_dep_fs.c:82:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(s, "%s\\*", dirname);
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:183:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(fn, "%s.pup", pn);
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:305:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(path, fn);
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:400:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(sub, dirname);
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:409:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(subend, name);
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:418:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(plugin_name, name);
data/pcb-rnd-2.3.0/src_3rd/sphash/sphash.c:71:8:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	ret = vprintf(fmt, ap);
data/pcb-rnd-2.3.0/src_3rd/sphash/sphash.c:303:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(f, banner);
data/pcb-rnd-2.3.0/src_3rd/sphash/sphash.c:410:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(f, banner);
data/pcb-rnd-2.3.0/src_plugins/diag/diag.c:500:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(DLF_PREFIX "data begin\n");
data/pcb-rnd-2.3.0/src_plugins/diag/diag.c:507:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(DLF_PREFIX "data end\n");
data/pcb-rnd-2.3.0/src_plugins/diag/diag.c:528:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(DLF_PREFIX "error file not found\n");
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_flag_edit.c:131:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tmp, "Object flags of %s #%ld\n", pcb_obj_type_name(ctx.obj_type), ctx.obj->ID);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_padstack.c:199:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(tmp, "%d groups from\nthe %s copper group", proto->htop, proto->htop > 0 ? "top" : "bottom");
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_padstack.c:206:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(tmp, "%d groups from\nthe %s copper group", proto->hbottom, proto->hbottom > 0 ? "bottom" : "top");
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_padstack.c:478:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(end, pcb_proto_layers[from].name);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pinout.c:168:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(title, "Subcircuit #%ld (%s) pinout", sc->ID, sc->refdes);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_conf.c:78:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(path, e->key);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_conf.c:176:26:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		case RND_CFN_BOOLEAN:  strcpy(buf, *val->boolean ? "true" : "false"); break;
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_conf.c:180:26:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		case RND_CFN_UNIT:     strcpy(buf, (*val->unit)->suffix); break;
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_conf.c:181:26:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		case RND_CFN_COLOR:    strcpy(buf, val->color->str); break;
data/pcb-rnd-2.3.0/src_plugins/djopt/djopt.c:175:2:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vprintf(msg, a);
data/pcb-rnd-2.3.0/src_plugins/draw_fab/draw_fab.c:83:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf(tmp, fmt, a);
data/pcb-rnd-2.3.0/src_plugins/export_excellon/excellon.c:243:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(filename, fnbase);
data/pcb-rnd-2.3.0/src_plugins/export_gerber/gerber.c:1031:4:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			fprintf((FILE *)call_ctx, warn_txt);
data/pcb-rnd-2.3.0/src_plugins/export_oldconn/oldconn.c:246:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(message, "File '%s' exists, use anyway?", Filename);
data/pcb-rnd-2.3.0/src_plugins/export_openems/mesh.c:1241:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(name, "%s %s", bnd_names[n], bnd_names[n+1]);
data/pcb-rnd-2.3.0/src_plugins/export_ps/ps.c:509:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(buf, base);
data/pcb-rnd-2.3.0/src_plugins/export_ps/ps.c:511:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(buf2, ".%s.%s", which, suff + 1);
data/pcb-rnd-2.3.0/src_plugins/export_ps/ps.c:514:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(buf, "%s.%s.ps", base, which);
data/pcb-rnd-2.3.0/src_plugins/export_stl/test_load/error.h:1:42:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define rnd_message(RND_MSG_ERROR, x...) fprintf(stderr, x)
data/pcb-rnd-2.3.0/src_plugins/export_xy/xy.c:783:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(path, "%s.%s", tid, type); /* safe: tid's length is checked before it was put in the vector, type is hardwired in code and is never longer than a few chars */
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:270:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(fn_end, subdirentry->d_name);
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:310:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(working_, "%s%c%s", toppath, RND_DIR_SEPARATOR_C, subdir);
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:436:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(path, p);
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:443:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(path, "%s%c%s", ctx.path, RND_DIR_SEPARATOR_C, ctx.real_name);
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:491:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(cmd, "%s/sh -c \"%s%s%s %s\"", rnd_w32_bindir, libshell, sep, fullname, params);
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:498:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(cmd, "%s%s%s %s", libshell, sep, fullname, params);
data/pcb-rnd-2.3.0/src_plugins/fp_wget/edakrill.c:276:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
						strcpy(out, line);
data/pcb-rnd-2.3.0/src_plugins/fp_wget/gedasymbols.c:172:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(out, line);
data/pcb-rnd-2.3.0/src_plugins/fp_wget/wget_common.c:84:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(cmd, "%s/%s", cache_path, cdir);
data/pcb-rnd-2.3.0/src_plugins/fp_wget/wget_common.c:96:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(cmd, "%s/%s", cache_path, cdir);
data/pcb-rnd-2.3.0/src_plugins/fp_wget/wget_common.c:105:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(cmd, "%s/%s", cache_path, cdir);
data/pcb-rnd-2.3.0/src_plugins/import_calay/calay.c:223:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fname_cmp, fname_net);
data/pcb-rnd-2.3.0/src_plugins/import_calay/calay.c:227:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(end, CMPEXT);
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:232:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	 strcpy(buf,node->str1);
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:246:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	     strcpy(buf+strlen(node->str1)+1,node->str2 +1);
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:250:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	     strcpy(buf+strlen(node->str1)+1,node->str2);
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:2733:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define YYFPRINTF fprintf
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:5714:31:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  TokenStack[TSP & TS_MASK] = strcpy((char *)Malloc(strlen(str) + 1),str);
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:6028:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      	  sprintf(CharBuf,"'%s' is used more than once within '%s'",
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:6144:20:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        yylval.s = strcpy((char *)Malloc(l + 1),yytext);
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:6160:20:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        yylval.s = strcpy((char *)Malloc(l + 1),yytext);
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:6192:20:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        yylval.s = strcpy((char *)Malloc(l + 1),yytext);
data/pcb-rnd-2.3.0/src_plugins/import_ipcd356/ipcd356.c:345:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(tn, "%s-%s", refdes, term);
data/pcb-rnd-2.3.0/src_plugins/io_hyp/hyp_y.c:1233:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define YYFPRINTF fprintf
data/pcb-rnd-2.3.0/src_plugins/io_kicad/write.c:140:6:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
					sprintf(ctx->layer[idx].name, fl->name, idx);
data/pcb-rnd-2.3.0/src_plugins/io_kicad/write.c:173:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(ctx->layer[idx].name, fl->name);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:620:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buff, "%s.%ld", is_via ? "via" : "pin", ps->ID);
data/pcb-rnd-2.3.0/src_plugins/io_pcb/attribs.c:70:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(pe, n->name);
data/pcb-rnd-2.3.0/src_plugins/io_pcb/parse_l.c:2620:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(tmps, "%s%s%s", Path, RND_DIR_SEPARATOR_S, Filename);
data/pcb-rnd-2.3.0/src_plugins/io_pcb/parse_l.c:2622:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(tmps, "%s", Filename);
data/pcb-rnd-2.3.0/src_plugins/io_pcb/parse_y.c:1167:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define YYFPRINTF fprintf
data/pcb-rnd-2.3.0/src_plugins/io_tedax/footprint.c:458:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(name, "top_%s", ltyp);
data/pcb-rnd-2.3.0/src_plugins/io_tedax/footprint.c:460:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(name, "bottom_%s", ltyp);
data/pcb-rnd-2.3.0/src_plugins/io_tedax/footprint.c:463:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(name, "intern_%s", ltyp);
data/pcb-rnd-2.3.0/src_plugins/io_tedax/footprint.c:477:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(name, "%s_%s", lloc, ltyp);
data/pcb-rnd-2.3.0/src_plugins/io_tedax/tnetlist.c:98:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(id, "%s-%s", argv[2], argv[3]);
data/pcb-rnd-2.3.0/src_plugins/io_tedax/tnetlist.c:103:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(id, "%s-%s", argv[1], argv[2]);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/act.c:229:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
						sprintf(name, "/popups/%s-extobj-subcircuit", a0);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/act.c:245:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
						sprintf(name, "/popups/%s-%s", a0, tn);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/act.c:248:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
						sprintf(name, "/popups/%s-padstack-in-subc", a0);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/act.c:249:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(name2, "/popups/%s-misc", a0);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/act.c:253:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(name, "/popups/%s", a0);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layer_menu.c:96:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(act, "ToggleView(%s)", ml->abbrev);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layer_menu.c:97:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(chk, "ChkView(%s)", ml->abbrev);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layer_menu.c:102:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(act, "SelectLayer(%s)", ml->abbrev);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layer_menu.c:103:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(chk, "ChkLayer(%s)", ml->abbrev);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layer_menu.c:181:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf((char *)keyprops->action, "%s(%ld)", action_prefix, lid+1);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/routest.c:68:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(path, ANCH);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/routest.c:87:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(end, PCB->RouteStyle.array[idx].name);
data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/graph.c:25:8:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
#undef popen
data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/graph.c:103:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "dot -T%s -o %s.%s", type, name, type);
data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/graph.c:104:6:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	f = popen(cmd, "w");
data/pcb-rnd-2.3.0/src_plugins/order_pcbway/pcbway.c:213:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(f->name, (char *)n->name);
data/pcb-rnd-2.3.0/src_plugins/propedit/propsel.c:101:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(nm+2, list->List[i].name);
data/pcb-rnd-2.3.0/src_plugins/propedit/propsel.c:122:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(end, i->name);
data/pcb-rnd-2.3.0/src_plugins/query/query_y.c:877:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define YYFPRINTF fprintf
data/pcb-rnd-2.3.0/src_plugins/renumber/renumber.c:257:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(tmps, "%s%d", cnt_list[j].name, cnt_list[j].cnt);
data/pcb-rnd-2.3.0/src_plugins/renumber/renumberblock.c:60:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(new_ref + (refdes_split - old_ref), num_buf);
data/pcb-rnd-2.3.0/src_plugins/renumber/renumberblock.c:105:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(new_ref + (refdes_split - old_ref), num_buf);
data/pcb-rnd-2.3.0/src_plugins/report/report.c:129:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(stringlist,
data/pcb-rnd-2.3.0/src_plugins/script/live_script.c:133:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(fn_end, de->d_name);
data/pcb-rnd-2.3.0/src_plugins/script/timer.c:149:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(t->aname, fn);
data/pcb-rnd-2.3.0/tests/conf/conftest.c:199:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(tmp, "%s-%d", first->name, np);
data/pcb-rnd-2.3.0/tests/conf/conftest.c:227:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tmp, "%s%s", arg, end);
data/pcb-rnd-2.3.0/tests/pcb-printf/tester.c:40:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(fmt_tmp, "%s=%s\n", (*f)+1, *f);
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:133:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			cc = getenv("CC");
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:614:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));
data/pcb-rnd-2.3.0/src/main.c:123:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		tmps = getenv("PATH");
data/pcb-rnd-2.3.0/src/main.c:453:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));  /* Set seed for rand() */
data/pcb-rnd-2.3.0/src_3rd/libcdtr/cdt_test.c:182:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_fs.c:67:9:  [3] (buffer) getwd:
  This does not protect against buffer overflows by itself, so use with
  caution (CWE-120, CWE-20). Use getcwd instead.
	return getwd(path);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_fs.c:187:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	tmpdir = getenv("TMPDIR");
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_fs.c:231:23:  [3] (tmpfile) tmpnam:
  Temporary file race condition (CWE-377).
	tmpfile = rnd_strdup(tmpnam(NULL));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_lrealpath.c:78:20:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
		const char *rp = realpath(filename, buf);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_lrealpath.c:111:8:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
	char *realpath(const char *path, char *resolved_path);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_lrealpath.c:122:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
			rp = realpath(filename, buf);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_misc.c:46:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	return (long) random();
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_init.c:323:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char *homedir = getenv("HOME");
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_init.c:325:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		homedir = getenv("USERPROFILE");
data/pcb-rnd-2.3.0/src_plugins/io_bxl/bxl_gram.c:445:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if ((yys = getenv("pcb_bxl_DEBUG")) != 0) {
data/pcb-rnd-2.3.0/tests/strflags/tester.c:57:2:  [3] (random) srandom:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srandom((unsigned int) now + getpid());
data/pcb-rnd-2.3.0/tests/strflags/tester.c:90:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			if ((random() & 4) == 0)
data/pcb-rnd-2.3.0/tests/strflags/tester.c:99:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
				if (random() & 4)
data/pcb-rnd-2.3.0/tests/strflags/tester.c:128:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			if ((random() & 4) == 0)
data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/netlister.c:49:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	gnetlist = getenv("GNETLIST");
data/pcb-rnd-2.3.0/scconfig/hooks.c:283:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char apiver[32], version_major[32];
data/pcb-rnd-2.3.0/scconfig/hooks.c:295:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	v1 = atoi(curr);
data/pcb-rnd-2.3.0/scconfig/hooks.c:297:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	v2 = atoi(curr);
data/pcb-rnd-2.3.0/scconfig/hooks.c:298:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	v3 = atoi(next+1);
data/pcb-rnd-2.3.0/scconfig/hooks.c:299:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(apiver, "%01d%01d%02d%05ld", v1, v2, v3, r);
data/pcb-rnd-2.3.0/scconfig/hooks.c:371:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen("Rev.stamp", "w");
data/pcb-rnd-2.3.0/scconfig/revtest.c:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[8192];
data/pcb-rnd-2.3.0/scconfig/revtest.c:29:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen(argv[1], "r");
data/pcb-rnd-2.3.0/scconfig/src/c99/find_c99.c:626:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[1024];
data/pcb-rnd-2.3.0/scconfig/src/c99/find_c99.c:627:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[128];
data/pcb-rnd-2.3.0/scconfig/src/c99/find_c99.c:628:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char det_target[16];
data/pcb-rnd-2.3.0/scconfig/src/default/db.c:55:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new,      orig,  l1);
data/pcb-rnd-2.3.0/scconfig/src/default/db.c:56:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new + l1, value, l2);
data/pcb-rnd-2.3.0/scconfig/src/default/db.c:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char first_level_dir[32];
data/pcb-rnd-2.3.0/scconfig/src/default/db.c:137:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen(fn, "w");
data/pcb-rnd-2.3.0/scconfig/src/default/db.c:212:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/pcb-rnd-2.3.0/scconfig/src/default/db.c:217:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(fn, "r");
data/pcb-rnd-2.3.0/scconfig/src/default/db.c:314:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[256];
data/pcb-rnd-2.3.0/scconfig/src/default/db.c:324:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[256];
data/pcb-rnd-2.3.0/scconfig/src/default/db.c:423:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buff + totallen, value, len);
data/pcb-rnd-2.3.0/scconfig/src/default/dep.c:61:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pres, name_, len-1);
data/pcb-rnd-2.3.0/scconfig/src/default/dep.c:62:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(pres+len-1, "presents");
data/pcb-rnd-2.3.0/scconfig/src/default/dep.c:102:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(name, name_, len+1); /* make a copy we can modify */
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:120:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(targetcc, target, len);
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:121:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(targetcc + len, "-gcc");
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:123:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(targetcc + len, "-cc");
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:196:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[128], *end;
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:235:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[128], *end;
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:239:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(name, "cc/argmachine/");
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:404:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[64];
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:405:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[256];
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:444:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[64];
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:445:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[256];
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:490:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[256];
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:772:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_host_app[1024];
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:858:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_lib[1024];
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:859:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_app[1024];
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:943:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dll_ldflags[128];
data/pcb-rnd-2.3.0/scconfig/src/default/find_environ.c:52:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (atoi(out) > 1) {
data/pcb-rnd-2.3.0/scconfig/src/default/find_environ.c:90:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (atoi(out) > 1) {
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:200:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[256];
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:212:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nodename[128];
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:260:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[256];
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:275:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nodename[128];
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:317:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[256];
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:321:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nodename[128];
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:364:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[384], node[64];
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:466:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[1024];
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:530:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[1024];
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:610:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[1024];
data/pcb-rnd-2.3.0/scconfig/src/default/find_fscalls.c:645:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(tmp, "w");
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:160:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(file, "w");
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:321:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd[1024];
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:354:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd[1024];
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:381:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd[1024];
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:454:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd[1024];
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:619:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(targetar, target, len);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:620:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(targetar + len, "-ar");
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:668:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(targetranlib, target, len);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:669:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(targetranlib + len, "-ranlib");
data/pcb-rnd-2.3.0/scconfig/src/default/find_io.c:123:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[256];
data/pcb-rnd-2.3.0/scconfig/src/default/find_io.c:167:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[3256];
data/pcb-rnd-2.3.0/scconfig/src/default/find_printf.c:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[512];
data/pcb-rnd-2.3.0/scconfig/src/default/find_printf.c:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[512];
data/pcb-rnd-2.3.0/scconfig/src/default/find_proc.c:124:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[1024];
data/pcb-rnd-2.3.0/scconfig/src/default/find_signal.c:93:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[256];
data/pcb-rnd-2.3.0/scconfig/src/default/find_signal.c:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[256], *pathend;
data/pcb-rnd-2.3.0/scconfig/src/default/find_sys.c:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *end, W[32];
data/pcb-rnd-2.3.0/scconfig/src/default/find_sys.c:61:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(W, "%d", w * 8);
data/pcb-rnd-2.3.0/scconfig/src/default/find_sys.c:104:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c_blind[1024];
data/pcb-rnd-2.3.0/scconfig/src/default/find_sys.c:407:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdline[256];
data/pcb-rnd-2.3.0/scconfig/src/default/find_sys.c:422:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(cmdline, "echo ");
data/pcb-rnd-2.3.0/scconfig/src/default/find_time.c:145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[1000];
data/pcb-rnd-2.3.0/scconfig/src/default/find_time.c:161:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[1000];
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[512], *start;
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:70:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			size = atoi(out+3);
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:72:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(test_c, "%d", size);
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:117:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *sizearr_u[MAX_INT_WIDTH];
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:118:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *sizearr_s[MAX_INT_WIDTH];
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:119:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *sizearr_f[MAX_FLT_WIDTH];
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:120:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char inc_stdint_u[MAX_INT_WIDTH];
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:121:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char inc_stdint_s[MAX_INT_WIDTH];
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:126:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[64];
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:203:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[512];
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:204:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char node[256], *nodeend;
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:267:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(nodeend-1, "_ptr");
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:283:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(nodeend, "includes");
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:301:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(nodeend, "presents");
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:309:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(nodeend, "broken");
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:315:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(nodeend, "broken");
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:333:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(nodeend, "size");
data/pcb-rnd-2.3.0/scconfig/src/default/find_uname.c:139:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(s, bopat[0], len);
data/pcb-rnd-2.3.0/scconfig/src/default/find_uname.c:308:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fake_sep[2];
data/pcb-rnd-2.3.0/scconfig/src/default/ht.c:145:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(newentry, entry, sizeof(ht_entry_t));
data/pcb-rnd-2.3.0/scconfig/src/default/lib_compile.c:53:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(output, s, len);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_file.c:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[1024];
data/pcb-rnd-2.3.0/scconfig/src/default/lib_file.c:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[1024];
data/pcb-rnd-2.3.0/scconfig/src/default/lib_file.c:101:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			f = fopen(s, "w");
data/pcb-rnd-2.3.0/scconfig/src/default/lib_file.c:129:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f  = fopen(fn, "w");
data/pcb-rnd-2.3.0/scconfig/src/default/lib_file.c:145:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen(name, "r");
data/pcb-rnd-2.3.0/scconfig/src/default/lib_file.c:235:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path, "a");
data/pcb-rnd-2.3.0/scconfig/src/default/lib_filelist.c:70:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen(fn, "w");
data/pcb-rnd-2.3.0/scconfig/src/default/lib_filelist.c:117:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (strncmp(argv[n], "dir", 3) == 0)  { arr = dir;  idx = atoi(argv[n]+3); }
data/pcb-rnd-2.3.0/scconfig/src/default/lib_filelist.c:118:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (strncmp(argv[n], "file", 4) == 0) { arr = file; idx = atoi(argv[n]+4); }
data/pcb-rnd-2.3.0/scconfig/src/default/lib_pkg_config.c:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd[256];
data/pcb-rnd-2.3.0/scconfig/src/default/lib_pkg_config.c:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd[256];
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char c[1024];
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:27:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(c, includes, l);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char apath[1024], *apath_end;
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:340:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[1024];
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:372:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[512];
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:373:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ls[16];
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:393:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(ls, "%ld", field_accept_len);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_uniqinc.c:138:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(end, *arr, len);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_uniqinc.c:140:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(end, osep, oseplen);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_uniqinc.c:165:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(end, arr[ndx], len);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_uniqinc.c:167:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(end, osep, oseplen);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_uniqinc.c:298:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(end, str, len); \
data/pcb-rnd-2.3.0/scconfig/src/default/log.c:37:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		logfile = fopen(fn_log, "w");
data/pcb-rnd-2.3.0/scconfig/src/default/log.c:40:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		logfile = fopen(fn_log, "a");
data/pcb-rnd-2.3.0/scconfig/src/default/log.c:102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[2048];
data/pcb-rnd-2.3.0/scconfig/src/default/log.c:108:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(fn, "r");
data/pcb-rnd-2.3.0/scconfig/src/default/main_custom_args.c:31:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *custom_reqs[MAX_CUSTOM_REQS];
data/pcb-rnd-2.3.0/scconfig/src/default/main_custom_args.h:2:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char *custom_reqs[MAX_CUSTOM_REQS];
data/pcb-rnd-2.3.0/scconfig/src/default/regex.c:295:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *bopat[MAXTAG];
data/pcb-rnd-2.3.0/scconfig/src/default/regex.c:296:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *eopat[MAXTAG];
data/pcb-rnd-2.3.0/scconfig/src/default/regex.c:606:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, bol, l1);
data/pcb-rnd-2.3.0/scconfig/src/default/regex.c:608:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst+l1, sub, l2);
data/pcb-rnd-2.3.0/scconfig/src/default/regex.c:609:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst+l1+l2, eopat[0], l3+1);
data/pcb-rnd-2.3.0/scconfig/src/default/str.c:38:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ret, str, l);
data/pcb-rnd-2.3.0/scconfig/src/default/str.c:108:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *str[CONCAT_MAX];
data/pcb-rnd-2.3.0/scconfig/src/default/str.c:142:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(o, sep, sl);
data/pcb-rnd-2.3.0/scconfig/src/default/str.c:146:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(o, str[n], len[n]);
data/pcb-rnd-2.3.0/scconfig/src/generator/generator.c:59:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char cmd_buff[1024];
data/pcb-rnd-2.3.0/scconfig/src/generator/generator.c:473:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(bopat[0], csub, slen);
data/pcb-rnd-2.3.0/scconfig/src/generator/generator.c:539:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(idx, "%d", i);
data/pcb-rnd-2.3.0/scconfig/src/generator/generator.c:545:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(idx, "%d", i);
data/pcb-rnd-2.3.0/scconfig/src/gui/find_gl.c:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[256];
data/pcb-rnd-2.3.0/scconfig/src/gui/find_gl.c:98:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[256];
data/pcb-rnd-2.3.0/scconfig/src/gui/find_gl.c:178:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char freeglut[4096];
data/pcb-rnd-2.3.0/scconfig/src/gui/find_gtk2.c:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[512];
data/pcb-rnd-2.3.0/scconfig/src/math/find_fpenan.c:204:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[2048];
data/pcb-rnd-2.3.0/scconfig/src/math/find_func.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[512];
data/pcb-rnd-2.3.0/scconfig/src/math/find_func.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char node_name[128];
data/pcb-rnd-2.3.0/scconfig/src/math/find_mfunc_cc.c:116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *res[256];
data/pcb-rnd-2.3.0/scconfig/src/math/find_mfunc_cc.c:117:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char node_name[256];
data/pcb-rnd-2.3.0/scconfig/src/menulib/hookreadline.c:87:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(h->line, nw, h->used+1);
data/pcb-rnd-2.3.0/scconfig/src/menulib/hookreadline.c:479:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *)hi->line, current, len);
data/pcb-rnd-2.3.0/scconfig/src/menulib/hookreadline.c:579:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(h->line, line, h->used+1);
data/pcb-rnd-2.3.0/scconfig/src/menulib/hookreadline.c:591:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(h->prompt, prompt, len);
data/pcb-rnd-2.3.0/scconfig/src/menulib/hrl_test.c:7:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char insert[32]; /* large enough for integer in decimal */
data/pcb-rnd-2.3.0/scconfig/src/menulib/hrl_test.c:15:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(insert, "%d", ctr++);
data/pcb-rnd-2.3.0/scconfig/src/menulib/hrl_test.c:34:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(h.prompt, "hrl-test> ");
data/pcb-rnd-2.3.0/scconfig/src/menulib/scmenu.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char frame_line[257];
data/pcb-rnd-2.3.0/scconfig/src/menulib/scmenu.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cont_line[257];
data/pcb-rnd-2.3.0/scconfig/src/menulib/scmenu_text.c:216:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(text, text_, tlen+1);
data/pcb-rnd-2.3.0/scconfig/src/menulib/vt100.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[128];
data/pcb-rnd-2.3.0/scconfig/src/menulib/vt100.h:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char seq[128];
data/pcb-rnd-2.3.0/scconfig/src/parsgen/find_parsgen.c:103:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(s, ".tab.c");
data/pcb-rnd-2.3.0/scconfig/src/parsgen/find_parsgen.c:151:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(s, ".tab.c");
data/pcb-rnd-2.3.0/scconfig/src/posix/find_dev.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[1024];
data/pcb-rnd-2.3.0/scconfig/src/posix/find_dev.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[128];
data/pcb-rnd-2.3.0/scconfig/src/posix/find_fs.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[8250];
data/pcb-rnd-2.3.0/scconfig/src/posix/find_fs.c:98:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[8250];
data/pcb-rnd-2.3.0/scconfig/src/posix/find_fs.c:162:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[8250];
data/pcb-rnd-2.3.0/scconfig/src/posix/find_proc.c:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[100];
data/pcb-rnd-2.3.0/scconfig/src/posix/find_proc.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[1000];
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_python.c:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[1024];
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_tcl.c:80:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char ifl[64], lfl[64];
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_tcl.c:90:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(lfl, "-ltcl%d", *v);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_tcl.c:93:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(lfl, "-ltcl%d.%d", major, minor);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_tcl.c:96:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(lfl, "-ltcl%d", *v);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_tcl.c:97:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(ifl, "-I/usr/include/tcl%d", *v);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_tcl.c:100:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(lfl, "-ltcl%d.%d", major, minor);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_tcl.c:101:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(ifl, "-I/usr/include/tcl%d.%d", major, minor);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_tcl.c:175:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rver[0] = atoi(reqver);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_tcl.c:254:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rver[0] = atoi(reqver);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_tcl.c:262:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char lfl[64];
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_tcl.c:277:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(lfl, "-ltk%d", *v);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_tcl.c:280:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(lfl, "-ltk%d.%d", major, minor);
data/pcb-rnd-2.3.0/scconfig/src/scripts/scripts.c:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nodename[1024], deflink[sizeof(nodename)];
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:203:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char node[256];
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:267:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[sizeof(test_c_temp)+64];
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:320:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[256];
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:588:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[1024];
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:633:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[1024];
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:683:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[1024];
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:839:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[1024];
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:840:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char node[128];
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:855:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(node, "libs/socket/");
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:886:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[1024];
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:887:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char node[128];
data/pcb-rnd-2.3.0/scconfig/src/socket/socket.c:74:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(src, includes, ilen);
data/pcb-rnd-2.3.0/scconfig/src/socket/socket.c:82:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(src+ilen, test_c, slen);
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/openfiles.c:20:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			f = fopen(name, "w");
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/openfiles.c:73:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	o->f = fopen(fn, mode);
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm.c:23:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ret, str, l);
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm.c:196:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(a->data, "QWERT");
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm.c:707:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(s+used, i, l);
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm.h:14:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data[1];          /* arg string - obviously longer than 1 char (but there's not special hack for that in C89), \0 terminated */
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm.h:150:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd_buff[TMPASM_INSTR_MAXLEN+1];
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:175:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[16];
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:176:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(str, "%d", argc);
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:194:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[16];
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:195:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(str, "%d", argc);
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:217:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[16];
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:218:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(str, "%d", argc);
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:312:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				memmove((char *)(bopat[0] + slen), eopat[0], mlen);
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:314:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *)bopat[0], csub, slen);
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:314:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		memcpy((char *)bopat[0], csub, slen);
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:327:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *uniq_eres[UNIQ_ERE_MAX];
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:421:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[16];
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:422:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(str, "%d", argc);
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:478:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fin = fopen(path, "r");
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:623:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fin = fopen(path, "r");
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:632:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fout = fopen(path, "w");
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/libfawk_sc_fawk.c:251:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char str[1];
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/libfawk_sc_fawk.c:644:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char buff[128];
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/libfawk_sc_fawk.c:649:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(buff, "%g", cell->data.num);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/libfawk_sc_fawk.c:1453:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 if (ret != NULL) memcpy(ret, s, l+1);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/libfawk_sc_fawk.c:1590:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(tmp, "Includes nested too deep\n"); \
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/libfawk_sc_fawk.c:1602:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(tmp, "Include not supported by the host application\n"); \
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/libfawk_sc_fawk.c:1635:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 memcpy(res->str, s, len);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/libfawk_sc_fawk.c:1646:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 memcpy(res->str, src->str, src->used+1);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/libfawk_sc_fawk.c:1670:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 memcpy(res->str, s1->str, s1->used);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/libfawk_sc_fawk.c:1671:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 memcpy(res->str+s1->used, s2->str, s2->used+1);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/libfawk_sc_fawk.c:2348:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char tmp[128];
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/libfawk_sc_fawk.c:2445:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(tmp, "Invalid character on input: '%c'\n", chr);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/tmpfawk.c:42:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(fn, from->fn, l2+1);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/tmpfawk.c:46:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(end, src->fn, l1+1);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/tmpfawk.c:47:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				f = fopen(fn, "r");
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/tmpfawk.c:50:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				f = fopen(src->fn, "r");
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/tmpfawk.c:54:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			f = fopen(src->fn, "r");
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/tmpfawk.c:257:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				memmove((char *)(bopat[0] + slen), eopat[0], mlen);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/tmpfawk.c:259:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *)bopat[0], csub, slen);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/tmpfawk.c:259:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		memcpy((char *)bopat[0], csub, slen);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/tmpfawk.c:430:30:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	ctx.parser.isp->user_data = fopen(input, "r");
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/tmpfawk.c:475:31:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	ctx->parser.isp->user_data = fopen(script_path, "r");
data/pcb-rnd-2.3.0/scconfig/src/tty/find_ioctl.c:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char node[128];
data/pcb-rnd-2.3.0/scconfig/src/tty/find_ioctl.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[1024];
data/pcb-rnd-2.3.0/scconfig/src/tty/find_ioctl.c:55:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(node, "libs/tty/ioctl/");
data/pcb-rnd-2.3.0/scconfig/src/tty/find_ioctl.c:71:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(nodeend, "/presents");
data/pcb-rnd-2.3.0/scconfig/src/userpass/find_username.c:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char test_c[512];
data/pcb-rnd-2.3.0/scconfig/src/userpass/find_username.c:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char node[128];
data/pcb-rnd-2.3.0/scconfig/src/util/ls.c:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char p[MAX_PATH];
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:309:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(out, dir, dlen);
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:311:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(out+dlen, bn, blen+1);
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:320:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[16384], dst2[MY_PATH_MAX];
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:353:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fs = fopen(src, "rb");
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:363:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = fopen(dst, "wb");
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:375:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fd = fopen(dst2, "wb");
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:378:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fd = fopen(dst2, "wb");
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:383:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				fd = fopen(dst, "wb");
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:430:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char pwd_buff[MY_PATH_MAX];
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:497:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(end, "../");
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:515:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd[MY_PATH_MAX*2+16], full_src_tmp[MY_PATH_MAX], rel_src_tmp[MY_PATH_MAX];
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:538:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(full_src_tmp, pwd, pwdlen);
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:540:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(full_src_tmp+pwdlen+1, src, srclen+1);
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:571:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char full_dst_tmp[MY_PATH_MAX];
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:601:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, path, len+1);
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:646:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(fn, "a");
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:734:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char path[MY_PATH_MAX];
data/pcb-rnd-2.3.0/src/actions_pcb.c:243:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[32];
data/pcb-rnd-2.3.0/src/attrib.c:233:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[32];
data/pcb-rnd-2.3.0/src/attrib.c:238:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buff, "%d", intconn & 0xFF);
data/pcb-rnd-2.3.0/src/board.c:186:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&ptr->Data->Layer[i].meta.real.color, pcb_layer_default_color(i, pcb_layer_flags(ptr, i)), sizeof(rnd_color_t));
data/pcb-rnd-2.3.0/src/buffer.c:1006:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	number = atoi(tmp);
data/pcb-rnd-2.3.0/src/buffer.c:1072:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				int numtmp = atoi(sbufnum);
data/pcb-rnd-2.3.0/src/change.c:930:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[1]; /* must be the last item, spans longer than 1 */
data/pcb-rnd-2.3.0/src/change.c:1016:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ca->key, key, len+1);
data/pcb-rnd-2.3.0/src/data.c:999:22:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	else if (addr == 1) strcpy(buf, "pcb");
data/pcb-rnd-2.3.0/src/draw.c:349:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char do_group[PCB_MAX_LAYERGRP];
data/pcb-rnd-2.3.0/src/draw.c:808:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(info->noexport_name, "noexport:");
data/pcb-rnd-2.3.0/src/draw.c:1101:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(save, &pcb_draw_out, sizeof(pcb_output_t));
data/pcb-rnd-2.3.0/src/draw.c:1152:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&pcb_draw_out, save, sizeof(pcb_output_t));
data/pcb-rnd-2.3.0/src/draw.c:1231:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buff, tmp.array, len);
data/pcb-rnd-2.3.0/src/draw.c:1319:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[128];
data/pcb-rnd-2.3.0/src/draw.c:1348:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[128];
data/pcb-rnd-2.3.0/src/draw.h:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char noexport_name[64];                /* "noexport:" attribute name rendered for the current exporter */
data/pcb-rnd-2.3.0/src/draw_label_smart.c:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char label[1]; /* dynamic length array */
data/pcb-rnd-2.3.0/src/draw_label_smart.c:58:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(l->label, label, len+1);
data/pcb-rnd-2.3.0/src/extobj_helper.h:168:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/pcb-rnd-2.3.0/src/extobj_helper.h:228:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/pcb-rnd-2.3.0/src/file_act.c:496:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *args[128];
data/pcb-rnd-2.3.0/src/find.c:54:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char layers[(PCB_MAX_LAYER / 8)+1]; /* for pstk */
data/pcb-rnd-2.3.0/src/find.c:287:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		vtp0_append(&ctx->open, obj);
data/pcb-rnd-2.3.0/src/find.c:450:45:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((ctx->start_layergrp == NULL) && (ctx->open.used > 0) && (ctx->pcb != NULL)) {
data/pcb-rnd-2.3.0/src/find.c:451:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		curr = ctx->open.array[0];
data/pcb-rnd-2.3.0/src/find.c:461:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	while((ctx->open.used > 0) && (!ctx->aborted)) {
data/pcb-rnd-2.3.0/src/find.c:463:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		ctx->open.used--;
data/pcb-rnd-2.3.0/src/find.c:464:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		curr = ctx->open.array[ctx->open.used];
data/pcb-rnd-2.3.0/src/find.c:464:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		curr = ctx->open.array[ctx->open.used];
data/pcb-rnd-2.3.0/src/find.c:546:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	vtp0_init(&ctx->open);
data/pcb-rnd-2.3.0/src/find.c:603:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	vtp0_uninit(&ctx->open);
data/pcb-rnd-2.3.0/src/find.h:83:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	vtp0_t open;                    /* objects already found but need checking for conns of (pcb_any_obj_t *) */
data/pcb-rnd-2.3.0/src/flag.c:90:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *pcb_dynflag_cookie[RND_DYNFLAG_BLEN];
data/pcb-rnd-2.3.0/src/flag.h:50:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char t[(PCB_MAX_LAYER + 1) / 2];  /* thermals */
data/pcb-rnd-2.3.0/src/flag.h:191:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char *pcb_dynflag_cookie[RND_DYNFLAG_BLEN];
data/pcb-rnd-2.3.0/src/flag_str.c:284:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(bp, "%d-%d,", i, j - 1);
data/pcb-rnd-2.3.0/src/flag_str.c:290:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(bp, "%d,", i);
data/pcb-rnd-2.3.0/src/flag_str.c:293:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(bp, "%d+,", i);
data/pcb-rnd-2.3.0/src/flag_str.c:296:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(bp, "%dS,", i);
data/pcb-rnd-2.3.0/src/flag_str.c:299:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(bp, "%dX,", i);
data/pcb-rnd-2.3.0/src/flag_str.c:303:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(bp, "%dt,", i);
data/pcb-rnd-2.3.0/src/flag_str.c:359:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rv.Flags.q = atoi(fp + 6);
data/pcb-rnd-2.3.0/src/flag_str.c:362:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			*intconn = atoi(fp + 8);
data/pcb-rnd-2.3.0/src/flag_str.c:497:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(bp, "thermal");
data/pcb-rnd-2.3.0/src/flag_str.c:510:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		bp += sprintf(bp, "shape(%d)", flags.q);
data/pcb-rnd-2.3.0/src/flag_str.c:516:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		bp += sprintf(bp, "intconn(%d)", *intconn);
data/pcb-rnd-2.3.0/src/flag_str.c:524:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(bp, u->str, len);
data/pcb-rnd-2.3.0/src/font.c:266:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(f, &pcb->fontkit.dflt, sizeof(pcb_font_t));
data/pcb-rnd-2.3.0/src/font.c:434:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, sizeof(pcb_font_t));
data/pcb-rnd-2.3.0/src/font.c:441:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(dst->Symbol[i].Line, src->Symbol[i].Line, sizeof(pcb_line_t) * src->Symbol[i].LineN);
data/pcb-rnd-2.3.0/src/font.c:447:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(p_dst->Points, p_src->Points, p_src->PointN * sizeof(rnd_point_t));
data/pcb-rnd-2.3.0/src/gui_act.c:783:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char fn[RND_ACTION_NAME_MAX];
data/pcb-rnd-2.3.0/src/gui_act.c:893:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char fn[RND_ACTION_NAME_MAX];
data/pcb-rnd-2.3.0/src/gui_act.c:1190:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	pcb_layervis_change_group_vis(RND_ACT_HIDLIB, atoi(name)-1, 1, 1);
data/pcb-rnd-2.3.0/src/gui_act.c:1272:33:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		pcb_layer_vis_change_all(PCB, open, vis);
data/pcb-rnd-2.3.0/src/gui_act.c:1294:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pcb_layer_t *ly = pcb_uilayer_get(atoi(name+3));
data/pcb-rnd-2.3.0/src/gui_act.c:1344:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pcb_layer_t *ly = pcb_uilayer_get(atoi(name+3));
data/pcb-rnd-2.3.0/src/gui_act.c:1524:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[2];
data/pcb-rnd-2.3.0/src/hid_cam.c:73:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[PCB_DERIVE_FN_SUFF_LEN];
data/pcb-rnd-2.3.0/src/hid_cam.c:139:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static char buf[PCB_DERIVE_FN_SUFF_LEN];
data/pcb-rnd-2.3.0/src/hid_cam.c:140:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf, "group%ld", group);
data/pcb-rnd-2.3.0/src/hid_cam.c:301:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *spk[64], *spv[64];
data/pcb-rnd-2.3.0/src/hid_cam.c:322:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(&dst->xform_[gid], &xf_, sizeof(rnd_xform_t));
data/pcb-rnd-2.3.0/src/hid_cam.c:330:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&dst->vxform_[vid], &xf_, sizeof(rnd_xform_t));
data/pcb-rnd-2.3.0/src/hid_cam.c:381:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char *spk[64], *spv[64], *end, *purpose = NULL;
data/pcb-rnd-2.3.0/src/hid_cam.c:420:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	res = atoi(*input);
data/pcb-rnd-2.3.0/src/hid_cam.c:462:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char varname[128];
data/pcb-rnd-2.3.0/src/idpath.c:255:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(res->id, path->id, (sizeof(long int) * path->len));
data/pcb-rnd-2.3.0/src/layer.c:790:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, sizeof(pcb_layer_t));
data/pcb-rnd-2.3.0/src/layer.c:1115:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(m, &mtmp, sizeof(undo_layer_move_t));
data/pcb-rnd-2.3.0/src/layer_addr.c:199:55:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int pcb_layergrp_list_by_addr(pcb_board_t *pcb, const char *curr, rnd_layergrp_id_t gids[PCB_MAX_LAYERGRP], char **spk, char **spv, int spc, int *vid, rnd_xform_t **xf, rnd_xform_t *xf_in, const char *err_prefix)
data/pcb-rnd-2.3.0/src/layer_addr.c:387:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *spk[64], *spv[64];
data/pcb-rnd-2.3.0/src/layer_addr.c:436:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/pcb-rnd-2.3.0/src/layer_addr.c:467:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, ":%ld", offs);
data/pcb-rnd-2.3.0/src/layer_addr.c:496:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/pcb-rnd-2.3.0/src/layer_addr.c:510:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buf, "/#%ld", n);
data/pcb-rnd-2.3.0/src/layer_addr.h:50:55:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
int pcb_layergrp_list_by_addr(pcb_board_t *pcb, const char *addr, rnd_layergrp_id_t gids[PCB_MAX_LAYERGRP], char **spk, char **spv, int spc, int *vid, rnd_xform_t **xf, rnd_xform_t *xf_in, const char *err_prefix);
data/pcb-rnd-2.3.0/src/layer_grp.c:287:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(d, s, sizeof(pcb_layergrp_t));
data/pcb-rnd-2.3.0/src/layer_grp.c:707:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&tmp, &stk->grp[from], sizeof(pcb_layergrp_t));
data/pcb-rnd-2.3.0/src/layer_grp.c:711:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&stk->grp[to_before], &tmp, sizeof(pcb_layergrp_t));
data/pcb-rnd-2.3.0/src/layer_grp.c:715:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&stk->grp[to_before-1], &tmp, sizeof(pcb_layergrp_t));
data/pcb-rnd-2.3.0/src/layer_grp.h:52:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	unsigned open:1;                       /* 1 if the group is open (expanded) on the GUI */
data/pcb-rnd-2.3.0/src/layer_vis.c:238:63:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
void pcb_layer_vis_change_all(pcb_board_t *pcb, rnd_bool_op_t open, rnd_bool_op_t vis)
data/pcb-rnd-2.3.0/src/layer_vis.c:246:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		rnd_bool_op(g->open, open);
data/pcb-rnd-2.3.0/src/layer_vis.c:246:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		rnd_bool_op(g->open, open);
data/pcb-rnd-2.3.0/src/layer_vis.h:73:63:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
void pcb_layer_vis_change_all(pcb_board_t *pcb, rnd_bool_op_t open, rnd_bool_op_t vis);
data/pcb-rnd-2.3.0/src/main.c:80:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *rnd_menu_file_paths[4];
data/pcb-rnd-2.3.0/src/main.c:208:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	free((char *)rnd_menu_file_paths[2]);
data/pcb-rnd-2.3.0/src/main_act.c:274:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/pcb-rnd-2.3.0/src/netlist.c:212:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[256];
data/pcb-rnd-2.3.0/src/netlist.c:219:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pn, pinname, len);
data/pcb-rnd-2.3.0/src/netlist.c:294:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char netname[1]; /* must be the last item, spans longer than 1 */
data/pcb-rnd-2.3.0/src/netlist.c:639:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[256];
data/pcb-rnd-2.3.0/src/netlist.c:646:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pn, pinname, len);
data/pcb-rnd-2.3.0/src/netlist.c:730:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(objs, &fctx.found, sizeof(vtp0_t));
data/pcb-rnd-2.3.0/src/netlist.c:966:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ratname_[32], *ratname, *id;
data/pcb-rnd-2.3.0/src/netlist.c:1017:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(ratname_, "pcbrnd%ld", ++netname_cnt);
data/pcb-rnd-2.3.0/src/netlist_act.c:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *pins[3] = { NULL, NULL, NULL };
data/pcb-rnd-2.3.0/src/obj_common.c:313:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, tmp, sizeof(tmp));
data/pcb-rnd-2.3.0/src/obj_common.h:117:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define pcb_xform_copy(dst, src)  memcpy(dst, src, sizeof(rnd_xform_t))
data/pcb-rnd-2.3.0/src/obj_gfx.c:729:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char *msg[4] = {
data/pcb-rnd-2.3.0/src/obj_pstk.c:276:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst->thermals.shape, src->thermals.shape, src->thermals.used * sizeof(src->thermals.shape[0]));
data/pcb-rnd-2.3.0/src/obj_pstk_proto.c:133:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst->x, src->x, sizeof(src->x[0]) * src->len * 2);
data/pcb-rnd-2.3.0/src/obj_pstk_proto.c:534:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, sizeof(pcb_pstk_shape_t));
data/pcb-rnd-2.3.0/src/obj_pstk_proto.c:569:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ts_dst->shape, ts_src->shape, sizeof(pcb_pstk_shape_t) * ts_src->len);
data/pcb-rnd-2.3.0/src/obj_pstk_proto.c:686:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, sizeof(pcb_pstk_proto_t));
data/pcb-rnd-2.3.0/src/obj_pstk_proto.c:798:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(data->ps_protos.array+first_free, proto, sizeof(pcb_pstk_proto_t));
data/pcb-rnd-2.3.0/src/obj_subc.c:158:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dst->meta, &src->meta, sizeof(src->meta));
data/pcb-rnd-2.3.0/src/obj_subc.c:871:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&dl->meta.bound, &sl->meta.bound, sizeof(sl->meta.bound));
data/pcb-rnd-2.3.0/src/obj_subc.c:987:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&dl->meta.bound, &sl->meta.bound, sizeof(sl->meta.bound));
data/pcb-rnd-2.3.0/src/obj_subc.c:995:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&dl->meta.bound, &sl->meta.bound, sizeof(sl->meta.bound));
data/pcb-rnd-2.3.0/src/obj_subc.c:1012:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&dl->meta.bound, &sl->meta.bound, sizeof(sl->meta.bound));
data/pcb-rnd-2.3.0/src/obj_subc.c:2384:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[1]; /* dynamic length */
data/pcb-rnd-2.3.0/src/obj_subc.c:2562:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(s, ps->thermals.shape, ps->thermals.used);
data/pcb-rnd-2.3.0/src/obj_term.c:179:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[1]; /* must be the last item, spans longer than 1 */
data/pcb-rnd-2.3.0/src/obj_term.c:265:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(r->str, new_name, nname_len+1);
data/pcb-rnd-2.3.0/src/obj_text.c:320:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *end, key[128], *path, *attrs;
data/pcb-rnd-2.3.0/src/object_act.c:788:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		old_index = atoi(a0);
data/pcb-rnd-2.3.0/src/object_act.c:850:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		new_index = atoi(a1);
data/pcb-rnd-2.3.0/src/plug_footprint.c:226:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(entry->name, name, nl);
data/pcb-rnd-2.3.0/src/plug_footprint.c:227:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(entry->name+nl, "()");
data/pcb-rnd-2.3.0/src/plug_footprint.c:444:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *toppath, toppath_[RND_PATH_MAX + 1];  /* String holding abs path to top level library dir */
data/pcb-rnd-2.3.0/src/plug_io.c:889:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[256];
data/pcb-rnd-2.3.0/src/plug_io.c:986:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fn_tmp, Filename, len);
data/pcb-rnd-2.3.0/src/plug_io.c:987:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(fn_tmp+len, ".old");
data/pcb-rnd-2.3.0/src/plug_io.c:991:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(fn_tmp+len, ".emr");
data/pcb-rnd-2.3.0/src/plug_io.h:206:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *digest[PCB_IO_MAX_FORMATS+1];           /* string that contains the format identifier and the description (strdup'd) */
data/pcb-rnd-2.3.0/src/plug_io.h:207:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *extension[PCB_IO_MAX_FORMATS+1];  /* default file extension, with the leading . (not strdup'd) */
data/pcb-rnd-2.3.0/src/polygon.c:1228:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, ((char *)&p.link - (char *)&p));
data/pcb-rnd-2.3.0/src/rats_patch.c:51:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *pcb_netlist_names[PCB_NUM_NETLISTS] = {
data/pcb-rnd-2.3.0/src/rats_patch.c:604:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(default_file, PCB->hidlib.filename, len + 1);
data/pcb-rnd-2.3.0/src/rats_patch.c:608:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(end, ".bap");
data/pcb-rnd-2.3.0/src/rats_patch.h:56:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char *pcb_netlist_names[PCB_NUM_NETLISTS];
data/pcb-rnd-2.3.0/src/route.c:90:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p_route->objects, &p_route->small_data[0], p_route->size * sizeof(pcb_route_object_t));
data/pcb-rnd-2.3.0/src/route_style.c:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[256];
data/pcb-rnd-2.3.0/src/thermal.c:112:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void pcb_thermal_bits2chars(char dst[3], pcb_thermal_t bits)
data/pcb-rnd-2.3.0/src/thermal.c:481:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cong[CONG_MAX];
data/pcb-rnd-2.3.0/src/thermal.c:574:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cong[CONG_MAX], cong2[CONG_MAX];
data/pcb-rnd-2.3.0/src/thermal.h:62:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void pcb_thermal_bits2chars(char dst[3], pcb_thermal_t bits);
data/pcb-rnd-2.3.0/src/undo_old.c:184:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(dst, "%d", slot->Type);
data/pcb-rnd-2.3.0/src/undo_old.c:1342:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buff[32];
data/pcb-rnd-2.3.0/src/undo_old.c:1364:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buff, "Unknown %d", type);
data/pcb-rnd-2.3.0/src/view.c:186:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&v->bbox, &obj->BoundingBox, sizeof(obj->BoundingBox));
data/pcb-rnd-2.3.0/src/view.c:207:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&v->bbox, &b, sizeof(b));
data/pcb-rnd-2.3.0/src/vtroutestyle.h:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[PCB_RST_NAME_LEN];  /* fixed length name to save malloc/free */
data/pcb-rnd-2.3.0/src_3rd/fast89-poly2tri/fast89_poly2tri.h:55:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define FP2T_MemoryCopy memcpy
data/pcb-rnd-2.3.0/src_3rd/genlist/genadlist.h:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data[1];
data/pcb-rnd-2.3.0/src_3rd/genregex/regex_templ.c:96:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *bopat[MAXTAG];
data/pcb-rnd-2.3.0/src_3rd/genregex/regex_templ.c:97:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *eopat[MAXTAG];
data/pcb-rnd-2.3.0/src_3rd/genregex/regex_templ.c:671:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(r->dst + r->dst_used, s, len);
data/pcb-rnd-2.3.0/src_3rd/genregex/tester_main.c:16:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/pcb-rnd-2.3.0/src_3rd/genregex/tester_main.c:17:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char subs[1024];
data/pcb-rnd-2.3.0/src_3rd/genregex/tester_main.c:64:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char copy[8192];
data/pcb-rnd-2.3.0/src_3rd/genregex/tester_main.c:66:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(copy, dst, len);
data/pcb-rnd-2.3.0/src_3rd/genrtree/genrtree_debug.h:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char spaces[1024];
data/pcb-rnd-2.3.0/src_3rd/gensexpr/gensexpr_impl.c:55:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(res, s, len);
data/pcb-rnd-2.3.0/src_3rd/gensexpr/gensexpr_impl.c:240:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char qc[2], tmp;
data/pcb-rnd-2.3.0/src_3rd/gensexpr/gsx_parse.c:154:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				goto open;
data/pcb-rnd-2.3.0/src_3rd/gensexpr/gsx_parse.c:208:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
					open:;
data/pcb-rnd-2.3.0/src_3rd/genvector/genvector_impl.c:196:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, len * sizeof(GVT_ELEM_TYPE));
data/pcb-rnd-2.3.0/src_3rd/genvector/genvector_impl.c:517:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, len * sizeof(GVT_ELEM_TYPE));
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw.c:36:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(res, s, len + 1);
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw.c:79:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(out, obj->name, ll);
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw.c:86:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(out+ll+1, name, nl+1);
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw.c:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[2*FGW_ID_LEN+2];
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw.c:141:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[2*FGW_ID_LEN+2];
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw.h:201:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	union { char c[sizeof(void *)*2]; void *p[2]; }
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw_conv.c:241:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(s, "%p", arg->val.ptr_void);
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw_conv.c:246:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		case FGW_CHAR:    sprintf(s, "%c", arg->val.nat_char); goto ok;
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw_conv.c:247:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		case FGW_UCHAR:   sprintf(s, "%u", arg->val.nat_uchar); goto ok;
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw_conv.c:248:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		case FGW_SCHAR:   sprintf(s, "%d", arg->val.nat_schar); goto ok;
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw_conv.c:249:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		case FGW_SHORT:   sprintf(s, "%d", arg->val.nat_short); goto ok;
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw_conv.c:250:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		case FGW_USHORT:  sprintf(s, "%u", arg->val.nat_ushort); goto ok;
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw_conv.c:251:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		case FGW_INT:     sprintf(s, "%d", arg->val.nat_int); goto ok;
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw_conv.c:252:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		case FGW_UINT:    sprintf(s, "%u", arg->val.nat_uint); goto ok;
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw_conv.c:253:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		case FGW_LONG:    sprintf(s, "%ld", arg->val.nat_long); goto ok;
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw_conv.c:254:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		case FGW_ULONG:   sprintf(s, "%lu", arg->val.nat_ulong); goto ok;
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw_conv.c:256:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		case FGW_SIZE_T:  sprintf(s, "%zd", arg->val.nat_size_t); goto ok;
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw_conv.c:258:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		case FGW_SIZE_T:  sprintf(s, "%ld", (long)arg->val.nat_size_t); goto ok;
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw_conv.c:260:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		case FGW_FLOAT:   sprintf(s, "%f", arg->val.nat_float); goto ok;
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw_conv.c:261:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		case FGW_DOUBLE:  sprintf(s, "%f", arg->val.nat_double); goto ok;
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw_conv.c:263:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		case FGW_LDOUBLE: sprintf(s, "%d", arg->val.nat_short); goto ok;
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw_conv.c:264:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		case FGW_LLONG:   sprintf(s, "%lld", arg->val.nat_llong); goto ok;
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw_conv.c:265:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		case FGW_ULLONG:  sprintf(s, "%llu", arg->val.nat_ullong); goto ok;
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/fungw_fawk.c:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[256];
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/fungw_fawk.c:40:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(tmp, " %ld:%ld\n", loc_line, loc_col);
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/fungw_fawk.c:57:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(fn, from->fn, l2+1);
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/fungw_fawk.c:61:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(end, src->fn, l1+1);
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/fungw_fawk.c:62:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				f = fopen(fn, "r");
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/fungw_fawk.c:65:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				f = fopen(src->fn, "r");
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/fungw_fawk.c:69:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			f = fopen(src->fn, "r");
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/fungw_fawk.c:275:31:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	ctx->parser.isp->user_data = fopen(filename, "r");
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:278:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char str[1];
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:679:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char buff[128];
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:1480:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 if (ret != NULL) memcpy(ret, s, l+1);
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:1615:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(tmp, "Includes nested too deep\n"); \
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:1626:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(tmp, "Include not supported by the host application\n"); \
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:1664:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 memcpy(res->str, s, len);
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:1671:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 memcpy(res->str, src->str, src->used+1);
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:1696:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 memcpy(res->str, s1->str, s1->used);
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:1697:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 memcpy(res->str+s1->used, s2->str, s2->used+1);
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:2280:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char tmp[128];
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:2376:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(tmp, "Invalid character on input: '%c'\n", chr);
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:2462:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char tmp[128];
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:2463:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 if (lab == NULL) sprintf(lab = tmp, "%ld", (long)lineno);
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:2469:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char tmp[128];
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:2471:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 if (lab == NULL) sprintf(lab = tmp, "%ld", (long)lineno);
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:3006:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char tmp[128];
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:3098:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(tmp, "Invalid character on input: '%c'\n", chr);
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:3632:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char tmp[128];
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:3723:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(tmp, "Invalid character on input: '%c'\n", chr);
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/lhtpers.c:97:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *loc_accept[LHT_LOC_max] = {
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/lhtpers.c:114:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, sizeof(lht_perstyle_t));
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/lhtpers.c:120:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(dst->buff[n].s, src->buff[n].s, src->buff[n].used);
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/lhtpers.c:842:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	outf = fopen(outfn, "wb");
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/lhtpers.c:845:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	inf  = fopen(infn, "rb");
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/output.c:61:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(p.s, ind, l1);
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/output.c:64:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(p.s+l1, s2, l2);
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/output.c:73:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(p.s, s2, l2);
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/output.c:75:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(p.s+l2, ind, l1);
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/output.c:84:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&sp->buff[loc], &p, sizeof(p));
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/output.c:136:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tmp, name_pre, len);
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/tests/perstest.c:157:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char out[256];
data/pcb-rnd-2.3.0/src_3rd/liblihata/dom.c:367:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ind->s + levels, ind->prefix, ind->prefix_len + 1);
data/pcb-rnd-2.3.0/src_3rd/liblihata/dom.c:774:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(fn, "r");
data/pcb-rnd-2.3.0/src_3rd/liblihata/lihata.c:151:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(n, s, len+1);
data/pcb-rnd-2.3.0/src_3rd/liblihata/test_tree.c:44:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(fn, "r");
data/pcb-rnd-2.3.0/src_3rd/liblihata/test_tree.c:82:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(s, start, len);
data/pcb-rnd-2.3.0/src_3rd/liblihata/test_tree.c:951:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char line[1024], *l, *end;
data/pcb-rnd-2.3.0/src_3rd/liblihata/tree.c:189:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(s, dst->data.text.value, l1);
data/pcb-rnd-2.3.0/src_3rd/liblihata/tree.c:190:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(s+l1, src->data.text.value, l2+1);
data/pcb-rnd-2.3.0/src_3rd/liblihata/tree_path.c:241:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[64];
data/pcb-rnd-2.3.0/src_3rd/liblihata/tree_path.c:260:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(buff, "%d", lht_tree_list_find_node(tmp->parent, tmp));
data/pcb-rnd-2.3.0/src_3rd/liblihata/tree_path.c:265:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(buff, "%d/%d", row, col);
data/pcb-rnd-2.3.0/src_3rd/liblihata/tree_path.c:291:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(path, tmp->name, len);
data/pcb-rnd-2.3.0/src_3rd/liblihata/tree_path.c:294:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(buff, "%d", lht_tree_list_find_node(tmp->parent, tmp));
data/pcb-rnd-2.3.0/src_3rd/liblihata/tree_path.c:297:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(path, buff, len);
data/pcb-rnd-2.3.0/src_3rd/liblihata/tree_path.c:301:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(buff, "%d/%d", row, col);
data/pcb-rnd-2.3.0/src_3rd/liblihata/tree_path.c:304:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(path, buff, len);
data/pcb-rnd-2.3.0/src_3rd/libminuid/libminuid.c:51:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buff[MINUID_SID_LEN];
data/pcb-rnd-2.3.0/src_3rd/libminuid/libminuid.c:54:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(fn, "rb");
data/pcb-rnd-2.3.0/src_3rd/libminuid/libminuid.c:97:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(d, sess->sid, MINUID_SID_LEN);
data/pcb-rnd-2.3.0/src_3rd/libminuid/libminuid.c:114:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, sizeof(minuid_bin_t));
data/pcb-rnd-2.3.0/src_3rd/libminuid/libminuid.h:36:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char sid[MINUID_SID_LEN];
data/pcb-rnd-2.3.0/src_3rd/libminuid/libminuid.h:42:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef unsigned char minuid_bin_t[MINUID_BIN_LEN];
data/pcb-rnd-2.3.0/src_3rd/libminuid/libminuid.h:45:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char minuid_str_t[MINUID_TXT_LEN];
data/pcb-rnd-2.3.0/src_3rd/libporty_net/libportytcp4.c:750:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[4];
data/pcb-rnd-2.3.0/src_3rd/libporty_net/libportytcp4.c:770:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			c = atoi(tmp);
data/pcb-rnd-2.3.0/src_3rd/libporty_net/libportytcp4.c:800:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		s += sprintf(s, "%d.", ip[n]);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/actions.c:78:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(out, inp, inp_len+1);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/actions.c:91:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char fn[RND_ACTION_NAME_MAX];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/actions.c:133:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fn[RND_ACTION_NAME_MAX];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/actions.c:259:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *argv[20];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/actions.c:273:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *argv[20];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/actions.c:367:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		argv[n+1].val.str = (char *)argsv[n];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/actions.c:489:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				argv[an+1].val.str = (char *)list[an];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/actions.c:566:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char prompt[128];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/actions.c:586:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(prompt, base, len);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/actions.c:587:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(prompt+len, suffix, slen);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/actions.c:907:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fgw_coords(arg), &tmp, sizeof(tmp));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/actions.c:948:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, line[4096];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/actions.h:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char absolute[4];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/color.c:147:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, sizeof(rnd_color_t));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/color.c:182:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(pcb_color_drill_.str, "drill");
data/pcb-rnd-2.3.0/src_3rd/librnd/core/color.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[10];             /* cache: "#rrggbb[aa]" \0 terminated string version */
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_fs.c:156:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *res, *c, num[256];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_fs.c:161:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(num, "%lu%lu", r1, r2);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_fs.c:220:16:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	(void) strcat(tmpfile, mytmpdir);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_fs.c:221:16:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	(void) strcat(tmpfile, RND_DIR_SEPARATOR_S);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_fs.c:222:16:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	(void) strcat(tmpfile, name);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_fs.c:233:9:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
	return tmpfile;
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_lrealpath.c:77:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[REALPATH_LIMIT];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_lrealpath.c:139:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[MAX_PATH];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_misc.c:76:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fab_author, gecos, len);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_misc.c:96:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(o, s, a);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_misc.c:106:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(o, s, l+1);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:270:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[RND_PATH_MAX], *fn;
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:282:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(path, dir, dlen);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:293:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char id[256];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:404:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:413:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmp, root->name, len+1);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:460:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char res[RND_PATH_MAX+1];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:898:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[256], *pathe;
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:907:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(path, path_prefix, ppl);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:917:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pathe, n->name, nl);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:1087:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				arr_idx = atoi(field+1);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:1691:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(arg, prefix, pl);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:1792:28:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					case RND_CFN_STRING:  strcpy(s, " str"); break;
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:1793:28:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					case RND_CFN_INTEGER: strcpy(s, " int"); break;
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:1794:28:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					case RND_CFN_REAL:    strcpy(s, " num"); break;
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:1795:28:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					case RND_CFN_COORD:   strcpy(s, " coord"); break;
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:1796:28:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					case RND_CFN_UNIT:    strcpy(s, " unit"); break;
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:1797:28:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					case RND_CFN_COLOR:   strcpy(s, " color"); break;
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:1798:28:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					case RND_CFN_LIST:    strcpy(s, " <list>"); break;
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:1799:28:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					case RND_CFN_HLIST:   strcpy(s, " <hlist>"); break;
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf_act.c:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char valbuff[128];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf_act.c:114:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(valbuff, "%f", d);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/error.h:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[1];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/funchash.c:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key_buff[1];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/gui_act.c:215:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		rnd_grid_list_jump(RND_ACT_HIDLIB, atoi(a));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/gui_act.c:218:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		rnd_grid_list_jump(RND_ACT_HIDLIB, atoi(op+1));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_cfg.c:44:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char hid_cfg_error_shared[1024];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_cfg_input.c:272:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[256];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_cfg_input.c:351:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(s, k, len);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_cfg_input.c:511:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buff[64];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_cfg_input.c:519:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(buff, "<unknown>");
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_cfg_input.c:526:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(buff, "<empty?>");
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_cfg_input.c:704:48:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			hk = malloc(sizeof(rnd_hid_cfg_keyhash_t)); memcpy(hk, &k, sizeof(k));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_cfg_input.c:705:48:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			hv = malloc(sizeof(rnd_hid_cfg_keyhash_t)); memcpy(hv, &v, sizeof(v));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_cfg_input.c:809:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(dst, " ...");
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_dad.h:98:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[1];   /* each cell is a char *; the true length of the array is the value of the len field; the array is allocated together with the struct */
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_dad.h:440:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&table[table ## _len-1], (attr), sizeof(rnd_hid_attribute_t)); \
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_dad.h:727:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			free((char *)table[field].name); \
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_dad_spin.c:129:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_dad_spin.c:316:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_dad_spin.c:322:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buf, "%ld", end->val.lng);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_dad_spin.c:328:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buf, "%f", end->val.dbl);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_dad_spin.c:641:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_dad_tree.c:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[2] = {NULL};
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_dlg.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_dlg.c:49:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(tmp, "gui_");
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_init.c:529:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *s, exedir[MAX_PATH];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_init.c:530:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		wchar_t *w, wexedir[MAX_PATH];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_menu.c:499:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[1]; /* extends longer */
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_menu.c:509:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(a->path, path->array, path->used+1);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_menu.c:743:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#undef fopen
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_menu.c:744:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			FILE *f = fopen("A_merged.lht", "w");
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_nogui.c:232:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[MAX_LINE_LENGTH];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_nogui.c:434:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(clip_data, data, len);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_nogui.c:456:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*data, clip_data, clip_len);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/paths.c:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[20];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/paths.c:48:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buff, "%.8i", rnd_getpid());
data/pcb-rnd-2.3.0/src_3rd/librnd/core/paths.c:94:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buff, "%lu", (unsigned long int)time(NULL));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/paths.c:224:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								char path[256], *q;
data/pcb-rnd-2.3.0/src_3rd/librnd/core/paths.c:231:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
								memcpy(path, start, len);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/paths.h:76:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *params['z' - 'a' + 1]; /* [0] for 'a' */
data/pcb-rnd-2.3.0/src_3rd/librnd/core/pixmap.c:113:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(i, imp, sizeof(rnd_pixmap_import_t));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/pixmap.c:178:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(r, pxm, sizeof(rnd_pixmap_t));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/pixmap.c:180:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(r->p, pxm->p, pxm->size);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:46:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *rnd_printf_slot[RND_PRINTF_SLOT_max] =
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[50];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:69:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	rv = sprintf(buf, "%g", d);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:148:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filemode_buff[128]; /* G_ASCII_DTOSTR_BUF_SIZE */
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:149:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char printf_spec_new_local[256];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:335:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filemode_buff[128]; /* G_ASCII_DTOSTR_BUF_SIZE */
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:336:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char printf_spec_new_local[256];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:478:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128]; /* large enough for rendering a long long int */
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:509:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char itmp[32];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:511:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					ilen = sprintf(itmp, "%d", va_arg(args, int));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:521:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				int slot = atoi(spec.array+2);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.h:142:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char *rnd_printf_slot[RND_PRINTF_SLOT_max];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/safe_fs.c:84:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(path_exp, mode);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/safe_fs.c:279:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[RND_PATH_MAX];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/tool.c:123:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id_s[32];
data/pcb-rnd-2.3.0/src_3rd/librnd/core/tool.c:147:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(id_s, "%d", id);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_batch/batch.c:117:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1000];
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_gtk2_gdk/gtkhid-gdk.c:74:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char tmp[16];
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_gtk2_gdk/gtkhid-gdk.c:79:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(tmp, "#%2.2x%2.2x%2.2x", (color->red >> 8) & 0xff, (color->green >> 8) & 0xff, (color->blue >> 8) & 0xff);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_gtk2_gl/gtkhid-gl.c:70:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char tmp[16];
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_gtk2_gl/gtkhid-gl.c:75:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(tmp, "#%2.2x%2.2x%2.2x", (color->red >> 8) & 0xff, (color->green >> 8) & 0xff, (color->blue >> 8) & 0xff);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/dialogs.c:283:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[16];
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/dlg_attr_tree.c:360:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[64];
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/main.c:530:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[10];
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/main.c:1675:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUFSIZ];
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/main.c:1690:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *par[8];
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/main.c:1743:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_options + acount, lesstif_options, sizeof(lesstif_options));
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/main.c:2868:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[65536];
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/menu.c:242:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[10];
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/wt_xpm.c:77:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	width = atoi(hdr);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/wt_xpm.c:82:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	height = atoi(hdr);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/wt_xpm.c:87:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	n_colors = atoi(hdr);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/xm_tree_table_priv.c:375:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name_buf[128] = { '\0' };
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/xm_tree_table_priv.c:380:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cb_strings[6] = { XmNdecrementCallback, XmNdragCallback, XmNincrementCallback,
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/xm_tree_table_priv.c:384:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(name_buf + name_len, "_v_scroll");
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/xm_tree_table_priv.c:412:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(name_buf + name_len, "_h_scroll");
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/xm_tree_table_widget.h:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char payload[1];          /* the payload - columns' text. Use tt_get_cell() to get an element. */
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_remote/proto_lowcommon.h:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pcmd[18];
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_remote/proto_lowsend.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[8192];
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/dlg_fileselect.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *fn[MAX_HIST];
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/dlg_fileselect.c:241:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		free((char *)flt_local[0].pat[0]);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/lib_gtk_config.c:109:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *end, dirname[128];
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/wt_preview.c:129:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&view, preview->obj, sizeof(rnd_box_t)); /* assumes the object's first field is rnd_box_t */
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/act_dad.c:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[1];
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/act_dad.c:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *values[MAX_ENUM+1];
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/act_dad.c:196:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmp->str, txt, len+1);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/cli_history.c:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd[1];
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/cli_history.c:58:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(h->cmd, s, len+1);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/cli_history.c:179:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *real_fn, *s, line[4096];
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/grid_menu.c:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char act[256], chk[256];
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/grid_menu.c:83:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(act, "grid(#%d)", idx);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/grid_menu.c:84:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(chk, "conf(iseq, editor/grids_idx, %d)", idx);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/menu_helper.c:64:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buff[256];
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/menu_helper.c:71:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buff, name, len);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/menu_helper.c:97:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(buff, cp, len);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/place.c:158:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*val = atoi(nat->prop->src->data.text.value);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/place.c:164:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *end, *end2, path[128 + sizeof(BASEPATH)];
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/place.c:183:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(end, nd->name, len);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/place.c:191:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(end2, "width"); place_conf_load(role, path, &w);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/place.c:192:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(end2, "height"); place_conf_load(role, path, &h);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/place.c:201:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[128 + sizeof(BASEPATH)];
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/place.c:217:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(end, e->key, len);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/place.c:223:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(end2, "width"); place_conf_set(role, path, e->value.w);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/place.c:224:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(end2, "height"); place_conf_set(role, path, e->value.h);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/stroke/stroke.c:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[255];
data/pcb-rnd-2.3.0/src_3rd/librnd/poly/polyarea.c:2905:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[256];
data/pcb-rnd-2.3.0/src_3rd/librnd/poly/polyarea.h:36:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define rnd_vertex_cpy(a,b) memcpy((a),(b),sizeof(rnd_vector_t))
data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/hooks_common.h:135:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int v = atoi(value);
data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/hooks_common.h:163:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[1024];
data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/hooks_common.h:217:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[1024];
data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/hooks_common.h:235:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[1024];
data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/hooks_common.h:293:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pwanted[1024], pgot[1024];
data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/hooks_common.h:334:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	return atoi(s);
data/pcb-rnd-2.3.0/src_3rd/librnd/scconfig/rnd_hook_detect.h:11:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[64];
data/pcb-rnd-2.3.0/src_3rd/libuhpgl/parse.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char inst[2];
data/pcb-rnd-2.3.0/src_3rd/libuhpgl/parse.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char token[32];
data/pcb-rnd-2.3.0/src_3rd/libuirc/libuirc.c:261:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(nick, ctx->nick, len);
data/pcb-rnd-2.3.0/src_3rd/libuirc/main.c:41:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char line[600];
data/pcb-rnd-2.3.0/src_3rd/libuundo/uundo.h:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char udata[1];               /* "flexible-size array" (C89-style); data for the callbacks start here */
data/pcb-rnd-2.3.0/src_3rd/libuundo/uundo_debug.c:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[8192];
data/pcb-rnd-2.3.0/src_3rd/libuundo/uundo_debug.c:42:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(buff, "<unknown>");
data/pcb-rnd-2.3.0/src_3rd/libuundo/uundo_debug.c:65:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char msg_buff[256];
data/pcb-rnd-2.3.0/src_3rd/libuundo/uundo_debug.c:93:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(msg, "lib-error: wrong item->prev->next after %ld", (long)i->prev->serial);
data/pcb-rnd-2.3.0/src_3rd/libuundo/uundo_debug.c:97:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(msg, "user-error: wrong serial after %ld", (long)i->prev->serial);
data/pcb-rnd-2.3.0/src_3rd/libuundo/uundo_debug.c:121:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "lib-error: number of undo items mismatch: lst=%ld count=%ld", (long)lst->num_undo, (long)num_undo);
data/pcb-rnd-2.3.0/src_3rd/libuundo/uundo_debug.c:126:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(msg, "lib-error: number of redo items mismatch: lst=%ld count=%ld", (long)lst->num_redo, (long)num_redo);
data/pcb-rnd-2.3.0/src_3rd/puplug/libs.c:56:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fd = open(file_name, O_RDONLY);
data/pcb-rnd-2.3.0/src_3rd/puplug/libs.c:132:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(buff, "pplg_");
data/pcb-rnd-2.3.0/src_3rd/puplug/libs.c:150:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buff[PUP_PATH_MAX];
data/pcb-rnd-2.3.0/src_3rd/puplug/libs.c:180:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char file_name[PUP_PATH_MAX];
data/pcb-rnd-2.3.0/src_3rd/puplug/libs.c:181:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pup_file_name[PUP_PATH_MAX];
data/pcb-rnd-2.3.0/src_3rd/puplug/libs.c:225:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			const char *local_dir_list[2];
data/pcb-rnd-2.3.0/src_3rd/puplug/libs.c:402:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *end, name[PUP_PATH_MAX], path[2*PUP_PATH_MAX+2];
data/pcb-rnd-2.3.0/src_3rd/puplug/libs_dep.c:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, buff[PUP_PATH_MAX+64];
data/pcb-rnd-2.3.0/src_3rd/puplug/libs_dep.c:91:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		veri = atoi(args);
data/pcb-rnd-2.3.0/src_3rd/puplug/libs_dep.c:145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[PUP_PATH_MAX*2];
data/pcb-rnd-2.3.0/src_3rd/puplug/libs_dep.c:158:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(pup_file_name, "r");
data/pcb-rnd-2.3.0/src_3rd/puplug/libs_dep_parse.h:99:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp[128];
data/pcb-rnd-2.3.0/src_3rd/puplug/libs_dep_parse.h:100:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(tmp, "line %d too long: %ld >= %ld", st->lineno, (long int) (st->s - st->buff), (long int) sizeof(st->buff));
data/pcb-rnd-2.3.0/src_3rd/puplug/os_dep.c:120:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(res, s, len+1);
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:38:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char key[64];
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:47:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(key, fmt+1, wlen);
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:88:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(res, s, len+1);
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, buff[8192];
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:176:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fn[8192];
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:186:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(fn, "r");
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:293:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char path[PUP_PATH_MAX];
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:324:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[1024];
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:339:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(list + used, buff, len);
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:389:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sub[PUP_PATH_MAX], *subend;
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:411:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char plugin_name[PUP_PATH_MAX], *tmp;
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:412:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			const char *vars[2*32];
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:450:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				free((char *)vars[n]);
data/pcb-rnd-2.3.0/src_3rd/qparse/example_dynamic.c:10:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[1024];
data/pcb-rnd-2.3.0/src_3rd/qparse/example_static.c:12:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[1024];
data/pcb-rnd-2.3.0/src_3rd/qparse/example_static.c:13:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *start[3] = {0};
data/pcb-rnd-2.3.0/src_3rd/qparse/example_static.c:14:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *tmp, *argv_static[8] = {0}, **argv = argv_static;
data/pcb-rnd-2.3.0/src_3rd/qparse/qparse.c:312:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(o, s, l+1);
data/pcb-rnd-2.3.0/src_3rd/sphash/sphash.c:89:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(r, s, len);
data/pcb-rnd-2.3.0/src_3rd/sphash/sphash.c:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024], *s;
data/pcb-rnd-2.3.0/src_3rd/sphash/sphash.c:296:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(file_name, file_name_, l);
data/pcb-rnd-2.3.0/src_3rd/sphash/sphash.c:301:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(file_name, "w");
data/pcb-rnd-2.3.0/src_3rd/sphash/sphash.c:409:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(file_name, "w");
data/pcb-rnd-2.3.0/src_3rd/sphash/sphash.c:541:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen(fn, "r");
data/pcb-rnd-2.3.0/src_3rd/sphash/test.c:7:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[128];
data/pcb-rnd-2.3.0/src_plugins/acompnet/meshgraph.c:88:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	htip_t closed, open;
data/pcb-rnd-2.3.0/src_plugins/acompnet/meshgraph.c:101:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	htip_init(&open, longhash, longkeyeq);
data/pcb-rnd-2.3.0/src_plugins/acompnet/meshgraph.c:103:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	htip_set(&open, startid, curr);
data/pcb-rnd-2.3.0/src_plugins/acompnet/meshgraph.c:114:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		for(e = htip_first(&open); e != NULL; e = htip_next(&open, e)) {
data/pcb-rnd-2.3.0/src_plugins/acompnet/meshgraph.c:114:56:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		for(e = htip_first(&open); e != NULL; e = htip_next(&open, e)) {
data/pcb-rnd-2.3.0/src_plugins/acompnet/meshgraph.c:126:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		htip_pop(&open, curr->id);
data/pcb-rnd-2.3.0/src_plugins/acompnet/meshgraph.c:148:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (htip_get(&open, next->id) == NULL) /* not in open */
data/pcb-rnd-2.3.0/src_plugins/acompnet/meshgraph.c:149:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				htip_set(&open, next->id, next);
data/pcb-rnd-2.3.0/src_plugins/act_read/act_layer.c:138:51:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
					res->type = FGW_INT; res->val.nat_int = grp->open;
data/pcb-rnd-2.3.0/src_plugins/ar_extern/e_route-rnd.c:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cmd, line[1024];
data/pcb-rnd-2.3.0/src_plugins/asm/asm.c:522:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *row[7];
data/pcb-rnd-2.3.0/src_plugins/autoroute/vector.c:169:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(newone->element, orig->element, orig->size * sizeof(vector_element_t));
data/pcb-rnd-2.3.0/src_plugins/cam/cam.c:121:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ctx->prefix, optval, dirlen);
data/pcb-rnd-2.3.0/src_plugins/cam/cam_gui.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[2], *cursor_path = NULL;
data/pcb-rnd-2.3.0/src_plugins/cam/cam_gui.c:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[4], tmp[1024];
data/pcb-rnd-2.3.0/src_plugins/cam/cam_gui.c:138:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[3], *cursor_path = NULL;
data/pcb-rnd-2.3.0/src_plugins/ddraft/cli.c:151:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/pcb-rnd-2.3.0/src_plugins/ddraft/cli.c:203:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(tmp, s, sep-s);
data/pcb-rnd-2.3.0/src_plugins/ddraft/cli.c:214:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(tmp, sep, next-sep);
data/pcb-rnd-2.3.0/src_plugins/ddraft/cli.c:277:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(str+from+extra, ins, inslen);
data/pcb-rnd-2.3.0/src_plugins/ddraft/cli.c:499:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *args, *cmd, *line, sline[1024], *op;
data/pcb-rnd-2.3.0/src_plugins/ddraft/cli.c:539:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(line, cline, len+1);
data/pcb-rnd-2.3.0/src_plugins/ddraft/cli_line.c:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[CLI_MAX_INS_LEN];
data/pcb-rnd-2.3.0/src_plugins/ddraft/constraint_gui.c:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[1024];
data/pcb-rnd-2.3.0/src_plugins/ddraft/constraint_gui.c:127:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *end, buff[1024];
data/pcb-rnd-2.3.0/src_plugins/diag/diag.c:502:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buff[1024];
data/pcb-rnd-2.3.0/src_plugins/diag/integrity.c:348:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char bn[16];
data/pcb-rnd-2.3.0/src_plugins/diag/integrity.c:349:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(bn, "buffer #%d", n);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_export.c:66:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&r[n], &(export_ctx->dlg[src].val), sizeof(rnd_hid_attr_val_t));
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_export.c:120:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&opts[i].default_val, &ctx->dlg[exp_attr[i]].val, sizeof(rnd_hid_attr_val_t));
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_flag_edit.c:121:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[128];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_fontsel.c:128:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char file[1] = "", id[5];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_layer_flags.c:77:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			ar |= pcb_layer_rename_(ly, (char *)dlg[wname].val.str, 1);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_layer_flags.c:169:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			ar |= pcb_layergrp_rename_(g, (char *)dlg[wname].val.str, 1);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_lib_pstk.c:93:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[4], *cursor_path = NULL;
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_lib_pstk.c:159:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char layers[pcb_proto_num_layers];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_lib_pstk.c:215:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ctx->drawbox, &ps->BoundingBox, sizeof(rnd_box_t));
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_lib_pstk.c:339:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[64];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_lib_pstk.c:363:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(tmp, "%u", ctx->proto_id);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_library.c:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *pnames[MAX_PARAMS]; /* param_idx -> parameter_name (also key stored in the param_names hash */
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_library.c:261:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[2];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_library.c:310:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024], *arg, *cmd, *end;
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_library_param.c:182:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_library_param.c:305:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *desc, buff[128];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_library_param.c:409:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *end, *argv_in[MAX_PARAMS], *argv_help[MAX_PARAMS];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_loadsave.c:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[RND_PATH_MAX + 1];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_loadsave.c:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char last_ext[32];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_netlist.c:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[6], *cursor_path = NULL;
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_netlist.c:105:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[2], *cursor_path = NULL;
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_netlist.c:225:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[128];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_padstack.c:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[256], *s;
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_padstack.c:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char shp_found[32];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_padstack.c:144:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy(tmp, "<unknown>");
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_padstack.c:197:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(tmp, "top copper group");
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_padstack.c:204:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(tmp, "bottom copper group");
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_padstack.c:460:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char src_shape_names[128];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_padstack.c:625:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[256];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_padstack.c:626:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *copy_from_names[pcb_proto_num_layers+1];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_padstack.c:645:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(tmp, "Automatically generate shape for ...");
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pinout.c:73:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[128];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pinout.c:75:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(tmp, "Subcircuit #%ld not found.", ctx->subc_id);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pinout.c:140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char title[64];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pinout.c:170:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(title, "Subcircuit #%ld pinout", sc->ID);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_plugins.c:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[4];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref.c:46:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *pref_tabs[PREF_TABS+1] = { "General", "Board meta", "Sizes & DRC",  "Library", "Layers", "Colors", "Window", "Key", "Menu", "Config tree", NULL };
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_color.c:152:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char tmp[32];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_color.c:157:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
						sprintf(tmp, "Layer %d", n);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_conf.c:41:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *type_tabs[RND_CFN_max+2] = /* MUST MATCH rnd_conf_native_type_t */
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_conf.c:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[2] = {NULL};
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_conf.c:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[1024];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_conf.c:149:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *cell[5]= {NULL};
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_conf.c:177:26:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		case RND_CFN_INTEGER:  sprintf(buf, "%ld", *val->integer); break;
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_conf.c:178:26:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		case RND_CFN_REAL:     sprintf(buf, "%f", *val->real); break;
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_conf.c:182:26:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		case RND_CFN_LIST:     strcpy(buf, "<list>"); break;
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_conf.c:183:26:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		case RND_CFN_HLIST:    strcpy(buf, "<hlist>"); break;
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_conf.c:184:26:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		case RND_CFN_max:      strcpy(buf, "<invalid-type>"); break;
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_conf.c:192:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *tmp, buf[128];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_conf.c:238:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *cell[4];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_conf.c:291:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[1024];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_conf.c:297:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(tmp, row->path, len);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_confedit.c:74:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			hv.lng = atoi(val);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_confedit.c:109:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char *cell[2] = {NULL};
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_confedit.c:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_confedit.c:141:25:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		case RND_CFN_INTEGER: sprintf(buf, "%ld", attr->val.lng); break;
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_confedit.c:142:25:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		case RND_CFN_REAL:    sprintf(buf, "%f", attr->val.dbl); break;
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_key.c:222:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *cell[3];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_lib.c:104:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[4];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_lib.c:191:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[4];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_lib.c:218:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[4];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_lib.c:304:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[4];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_lib.c:396:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp[256];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_test.c:319:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[256];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_test.c:323:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(tmp, "%ld", ctx->dlg[ctx->wspin_int].val.lng);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_test.c:325:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(tmp, "%f", ctx->dlg[ctx->wspin_double].val.dbl);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_test.c:484:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_test.c:489:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "cursor after edit: line %ld col %ld offs %ld", y, x, o);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_undo.c:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[4], *cursor_path = NULL;
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_undo.c:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *payload, buff[8192], mark[2], ser[64];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_undo.c:102:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(ser, "%ld", (long)i->serial);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_view.c:92:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[3], *cursor_path = NULL;
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_view.c:139:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[32];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_view.c:140:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(tmp, "%ld", cnt+1);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_view.c:149:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[32];
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_view.c:151:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(tmp, "%ld", (long)pcb_view_list_length(ctx->lst));
data/pcb-rnd-2.3.0/src_plugins/djopt/djopt.c:119:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char layer_type[PCB_MAX_LAYER];
data/pcb-rnd-2.3.0/src_plugins/djopt/djopt.c:141:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[4][100];
data/pcb-rnd-2.3.0/src_plugins/djopt/djopt.c:147:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf[bn], "\033[31m[%p freed corner]\033[0m", (void *) c);
data/pcb-rnd-2.3.0/src_plugins/djopt/djopt.c:151:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf[bn], "\033[%dm[%p ", (c->pin || c->pad || c->via) ? 33 : 34, (void *) c);
data/pcb-rnd-2.3.0/src_plugins/djopt/djopt.c:165:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(bp + strlen(bp), " n%d l%d]\033[0m", c->n_lines, c->layer);
data/pcb-rnd-2.3.0/src_plugins/djopt/djopt.c:1672:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char directions[PCB_MAX_LAYER];
data/pcb-rnd-2.3.0/src_plugins/djopt/djopt.c:1673:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char counts[PCB_MAX_LAYER];
data/pcb-rnd-2.3.0/src_plugins/draw_csect/draw_csect.c:252:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char layer_valid[PCB_MAX_LAYER];
data/pcb-rnd-2.3.0/src_plugins/draw_csect/draw_csect.c:253:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char group_valid[PCB_MAX_LAYERGRP];
data/pcb-rnd-2.3.0/src_plugins/draw_csect/draw_csect.c:814:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char tmp[32];
data/pcb-rnd-2.3.0/src_plugins/draw_csect/draw_csect.c:815:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(tmp, "%ld", lactive);
data/pcb-rnd-2.3.0/src_plugins/draw_fab/draw_fab.c:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[512];
data/pcb-rnd-2.3.0/src_plugins/draw_fab/draw_fab.c:207:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char utcTime[64];
data/pcb-rnd-2.3.0/src_plugins/draw_fab/draw_fab.c:297:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(utcTime, "<date>");
data/pcb-rnd-2.3.0/src_plugins/draw_fontsel/draw_fontsel.c:112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/pcb-rnd-2.3.0/src_plugins/draw_fontsel/draw_fontsel.c:173:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char sval[128];
data/pcb-rnd-2.3.0/src_plugins/draw_fontsel/draw_fontsel.c:174:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(sval, "%ld", fid);
data/pcb-rnd-2.3.0/src_plugins/drc_query/dlg.c:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/pcb-rnd-2.3.0/src_plugins/drc_query/dlg.c:133:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(tmp, "%ld", prog->qctx->hit_cnt);
data/pcb-rnd-2.3.0/src_plugins/drc_query/dlg.c:431:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[5], *cursor_path = NULL;
data/pcb-rnd-2.3.0/src_plugins/drc_query/dlg.c:479:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char *pcell[5];
data/pcb-rnd-2.3.0/src_plugins/drc_query/dlg.c:696:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[3], *cursor_path = NULL;
data/pcb-rnd-2.3.0/src_plugins/drc_query/dlg.c:737:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char *pcell[3];
data/pcb-rnd-2.3.0/src_plugins/export_bom/bom.c:185:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char utcTime[64];
data/pcb-rnd-2.3.0/src_plugins/export_dsn/dsn.c:211:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[512];
data/pcb-rnd-2.3.0/src_plugins/export_dsn/dsn.c:232:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[512];
data/pcb-rnd-2.3.0/src_plugins/export_dsn/dsn.c:265:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[512];
data/pcb-rnd-2.3.0/src_plugins/export_dsn/dsn.c:278:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[512];
data/pcb-rnd-2.3.0/src_plugins/export_dxf/dxf.c:223:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(saved_layer_stack, pcb_layer_stack, sizeof(pcb_layer_stack));
data/pcb-rnd-2.3.0/src_plugins/export_excellon/excellon.c:45:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *coord_format_names[NUM_COORD_FORMATS+1] = {
data/pcb-rnd-2.3.0/src_plugins/export_excellon/excellon.c:270:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(filesuff, ".plated.cnc");
data/pcb-rnd-2.3.0/src_plugins/export_excellon/excellon.c:278:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(filesuff, ".unplated.cnc");
data/pcb-rnd-2.3.0/src_plugins/export_fidocadj/fidocadj.c:100:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/pcb-rnd-2.3.0/src_plugins/export_gerber/gerber.c:191:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *coord_format_names[NUM_COORD_FORMATS+1] = {
data/pcb-rnd-2.3.0/src_plugins/export_gerber/gerber.c:370:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(saved_layer_stack, pcb_layer_stack, sizeof(pcb_layer_stack));
data/pcb-rnd-2.3.0/src_plugins/export_gerber/gerber.c:500:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char utcTime[64];
data/pcb-rnd-2.3.0/src_plugins/export_ipcd356/ipcd356.c:101:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[32], fmt[16];
data/pcb-rnd-2.3.0/src_plugins/export_ipcd356/ipcd356.c:108:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(fmt, "%%0%d.0ml", len);
data/pcb-rnd-2.3.0/src_plugins/export_ipcd356/ipcd356.c:112:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(fmt, "%%0%d.0mm", len);
data/pcb-rnd-2.3.0/src_plugins/export_ipcd356/ipcd356.c:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char utc[64];
data/pcb-rnd-2.3.0/src_plugins/export_ipcd356/ipcd356.c:145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[128];
data/pcb-rnd-2.3.0/src_plugins/export_ipcd356/ipcd356.c:180:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(line+38, "A00");
data/pcb-rnd-2.3.0/src_plugins/export_ipcd356/ipcd356.c:182:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(line+38, "A01");
data/pcb-rnd-2.3.0/src_plugins/export_ipcd356/ipcd356.c:184:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(line+38, "A02");
data/pcb-rnd-2.3.0/src_plugins/export_ipcd356/ipcd356.c:202:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(line+72, "S3");
data/pcb-rnd-2.3.0/src_plugins/export_ipcd356/ipcd356.c:204:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(line+72, "S1");
data/pcb-rnd-2.3.0/src_plugins/export_ipcd356/ipcd356.c:206:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(line+72, "S2");
data/pcb-rnd-2.3.0/src_plugins/export_ipcd356/ipcd356.c:208:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(line+72, "S0");
data/pcb-rnd-2.3.0/src_plugins/export_lpr/lpr.c:60:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(lpr_options, ps_opts, num_lpr_options * sizeof(rnd_hid_attribute_t));
data/pcb-rnd-2.3.0/src_plugins/export_lpr/lpr.c:61:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(lpr_options, base_lpr_options, sizeof(base_lpr_options));
data/pcb-rnd-2.3.0/src_plugins/export_oldconn/oldconn.c:242:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char message[RND_PATH_MAX + 80];
data/pcb-rnd-2.3.0/src_plugins/export_openems/excitation.c:80:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[128];
data/pcb-rnd-2.3.0/src_plugins/export_openems/excitation.c:81:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(tmp, "%d", exc_ctx.dlg[widx].val.lng);
data/pcb-rnd-2.3.0/src_plugins/export_openems/excitation.c:107:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[128];
data/pcb-rnd-2.3.0/src_plugins/export_openems/excitation.c:108:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(tmp, "%f Hz", exc_ctx.dlg[widx].val.dbl);
data/pcb-rnd-2.3.0/src_plugins/export_openems/excitation.c:420:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char *excnames[MAX_EXC+1];
data/pcb-rnd-2.3.0/src_plugins/export_openems/export_openems.c:700:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(runfn, filename, len+1);
data/pcb-rnd-2.3.0/src_plugins/export_openems/export_openems.c:704:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(end, ".sim.m");
data/pcb-rnd-2.3.0/src_plugins/export_openems/mesh.c:1240:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char name[64];
data/pcb-rnd-2.3.0/src_plugins/export_openems/mesh.h:30:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *bnd[6];                    /* temporary: boundary conditions */
data/pcb-rnd-2.3.0/src_plugins/export_openscad/export_openscad.c:158:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(saved_layer_stack, pcb_layer_stack, sizeof(pcb_layer_stack));
data/pcb-rnd-2.3.0/src_plugins/export_openscad/scad_models.c:35:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buff[1024], *full_path;
data/pcb-rnd-2.3.0/src_plugins/export_png/png.c:545:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(saved_layer_stack, pcb_layer_stack, sizeof(pcb_layer_stack));
data/pcb-rnd-2.3.0/src_plugins/export_ps/eps.c:280:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(saved_layer_stack, pcb_layer_stack, sizeof(pcb_layer_stack));
data/pcb-rnd-2.3.0/src_plugins/export_ps/ps.c:567:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(saved_layer_stack, pcb_layer_stack, sizeof(pcb_layer_stack));
data/pcb-rnd-2.3.0/src_plugins/export_stat/stat.c:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[1024];
data/pcb-rnd-2.3.0/src_plugins/export_stat/stat.c:392:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	free((char *)stat_attribute_list[HA_first_ver].default_val.str);
data/pcb-rnd-2.3.0/src_plugins/export_stat/stat.c:393:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	free((char *)stat_attribute_list[HA_license].default_val.str);
data/pcb-rnd-2.3.0/src_plugins/export_stl/stl_models.c:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cmd, line[512];
data/pcb-rnd-2.3.0/src_plugins/export_stl/stl_models.c:210:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mx, mx_ident, sizeof(mx_ident));
data/pcb-rnd-2.3.0/src_plugins/export_stl/stl_models.c:211:64:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	if (rotx != 0) { mx_rot_x(tmp, rotx); mx_mult(tmp2, mx, tmp); memcpy(mx, tmp2, sizeof(tmp2)); }
data/pcb-rnd-2.3.0/src_plugins/export_stl/stl_models.c:212:64:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	if (roty != 0) { mx_rot_y(tmp, roty); mx_mult(tmp2, mx, tmp); memcpy(mx, tmp2, sizeof(tmp2)); }
data/pcb-rnd-2.3.0/src_plugins/export_stl/stl_models.c:213:64:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	if (rotz != 0) { mx_rot_z(tmp, rotz); mx_mult(tmp2, mx, tmp); memcpy(mx, tmp2, sizeof(tmp2)); }
data/pcb-rnd-2.3.0/src_plugins/export_stl/stl_models.c:214:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mxn, mx, sizeof(mx));
data/pcb-rnd-2.3.0/src_plugins/export_stl/stl_models.c:218:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mx, tmp2, sizeof(tmp2));
data/pcb-rnd-2.3.0/src_plugins/export_stl/stl_models.c:259:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, tmp, sizeof(tmp));
data/pcb-rnd-2.3.0/src_plugins/export_stl/test_load/main.c:27:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen("A.stl", "w");
data/pcb-rnd-2.3.0/src_plugins/export_stl/test_load/safe_fs.h:2:33:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define rnd_fopen(hl, fn, mode) fopen(fn, mode)
data/pcb-rnd-2.3.0/src_plugins/export_svg/svg.c:226:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(saved_layer_stack, pcb_layer_stack, sizeof(pcb_layer_stack));
data/pcb-rnd-2.3.0/src_plugins/export_vfs_fuse/export_vfs_fuse.c:39:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char fuse_cwd[RND_PATH_MAX];
data/pcb-rnd-2.3.0/src_plugins/export_vfs_fuse/export_vfs_fuse.c:151:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf, data.array + offset, len);
data/pcb-rnd-2.3.0/src_plugins/export_vfs_mc/export_vfs_mc.c:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/pcb-rnd-2.3.0/src_plugins/export_xy/xy.c:112:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char id[MAX_TEMP_NAME_LEN];
data/pcb-rnd-2.3.0/src_plugins/export_xy/xy.c:127:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(id, li->name, len);
data/pcb-rnd-2.3.0/src_plugins/export_xy/xy.c:164:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char utcTime[64];
data/pcb-rnd-2.3.0/src_plugins/export_xy/xy.c:184:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/pcb-rnd-2.3.0/src_plugins/export_xy/xy.c:386:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char aname[256], unk_buf[256], *nope;
data/pcb-rnd-2.3.0/src_plugins/export_xy/xy.c:397:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(aname, *input, len);
data/pcb-rnd-2.3.0/src_plugins/export_xy/xy.c:407:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(unk_buf, *input, len);
data/pcb-rnd-2.3.0/src_plugins/export_xy/xy.c:421:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(unk_buf, *input, len);
data/pcb-rnd-2.3.0/src_plugins/export_xy/xy.c:759:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buff[256], *id, *sect;
data/pcb-rnd-2.3.0/src_plugins/export_xy/xy.c:765:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buff, i->name, nl+1);
data/pcb-rnd-2.3.0/src_plugins/export_xy/xy.c:779:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[MAX_TEMP_NAME_LEN + 16];
data/pcb-rnd-2.3.0/src_plugins/extedit/extedit.c:56:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *extedit_fmt_names[EEF_max+1] = {
data/pcb-rnd-2.3.0/src_plugins/extedit/extedit.c:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/pcb-rnd-2.3.0/src_plugins/extedit/extedit.c:154:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[128];
data/pcb-rnd-2.3.0/src_plugins/extedit/extedit_dad.c:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[256];
data/pcb-rnd-2.3.0/src_plugins/extedit/extedit_dad.c:84:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *names[NUM_METHODS+1];
data/pcb-rnd-2.3.0/src_plugins/extedit/extedit_dad.c:95:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(tmp, "Select external editor...");
data/pcb-rnd-2.3.0/src_plugins/exto_std/bus.c:328:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[32];
data/pcb-rnd-2.3.0/src_plugins/exto_std/cord.c:312:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sgrp[16], sterm[16];
data/pcb-rnd-2.3.0/src_plugins/exto_std/cord.c:315:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(sgrp, "%ld", (*grp)++);
data/pcb-rnd-2.3.0/src_plugins/exto_std/cord.c:319:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(sterm, "cord%ld", (*term)++);
data/pcb-rnd-2.3.0/src_plugins/exto_std/cord.c:380:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char sgrp[16], sterm[16];
data/pcb-rnd-2.3.0/src_plugins/exto_std/cord.c:385:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sgrp, "%ld", grp++);
data/pcb-rnd-2.3.0/src_plugins/exto_std/cord.c:387:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sterm, "cord%ld", term++);
data/pcb-rnd-2.3.0/src_plugins/exto_std/cord.c:390:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sterm, "cord%ld", term++);
data/pcb-rnd-2.3.0/src_plugins/exto_std/dimension.c:156:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ttmp[128];
data/pcb-rnd-2.3.0/src_plugins/exto_std/dimension.c:218:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(ttmp, "<invalid format>");
data/pcb-rnd-2.3.0/src_plugins/exto_std/dimension.c:267:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/pcb-rnd-2.3.0/src_plugins/fontmode/fontmode.c:152:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char txt[32];
data/pcb-rnd-2.3.0/src_plugins/fontmode/fontmode.c:163:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(txt, "%c", s);
data/pcb-rnd-2.3.0/src_plugins/fontmode/fontmode.c:166:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(txt, "%d", s);
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:159:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(end, subdir, sl); end += sl;
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:167:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(end, name, nl+1); end += nl;
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:207:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char olddir[RND_PATH_MAX + 1];     /* The directory we start out in (cwd) */
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:208:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char new_subdir[RND_PATH_MAX + 1];
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:209:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fn[RND_PATH_MAX + 1], *fn_end;
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:242:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fn, new_subdir, l);
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:306:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char working_[RND_PATH_MAX + 1];
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:415:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[RND_PATH_MAX + 1];
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:432:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(path, p, end - p);
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:505:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buff[4096];
data/pcb-rnd-2.3.0/src_plugins/fp_wget/edakrill.c:138:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/pcb-rnd-2.3.0/src_plugins/fp_wget/edakrill.c:144:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char last_sum_fn[RND_PATH_MAX];
data/pcb-rnd-2.3.0/src_plugins/fp_wget/edakrill.c:250:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *line, line_[8192], *end;
data/pcb-rnd-2.3.0/src_plugins/fp_wget/edakrill.c:290:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[1024];
data/pcb-rnd-2.3.0/src_plugins/fp_wget/gedasymbols.c:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/pcb-rnd-2.3.0/src_plugins/fp_wget/gedasymbols.c:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char last_sum_fn[RND_PATH_MAX];
data/pcb-rnd-2.3.0/src_plugins/fp_wget/gedasymbols.c:158:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *line, line_[8192];
data/pcb-rnd-2.3.0/src_plugins/fp_wget/gedasymbols.c:183:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[1024];
data/pcb-rnd-2.3.0/src_plugins/fp_wget/tester.c:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/pcb-rnd-2.3.0/src_plugins/fp_wget/wget_common.c:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[RND_PATH_MAX+32];
data/pcb-rnd-2.3.0/src_plugins/fp_wget/wget_common.c:141:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, sum[64];
data/pcb-rnd-2.3.0/src_plugins/import_accel_net/accel_net.c:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/pcb-rnd-2.3.0/src_plugins/import_accel_net/accel_net.c:209:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *s, line[1024];
data/pcb-rnd-2.3.0/src_plugins/import_calay/calay.c:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[512];
data/pcb-rnd-2.3.0/src_plugins/import_calay/calay.c:135:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[512];
data/pcb-rnd-2.3.0/src_plugins/import_calay/calay.c:246:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *s, line[16];
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:2982:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char const *yyarg[YYERROR_VERBOSE_ARGS_MAXIMUM];
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:3171:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char yymsgbuf[128];
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:5597:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char lower[IDENT_LENGTH + 1];
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:5699:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *TokenStack[TS_DEPTH];	/* token name strings */
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:5772:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char yytext[IDENT_LENGTH + 1];	/* token buffer */
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:5773:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char CharBuf[IDENT_LENGTH + 1];	/* garbage buffer */
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:5794:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char Data[BUCKET_SIZE];		/* string data */
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:6237:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        PushString(atoi(yytext));
data/pcb-rnd-2.3.0/src_plugins/import_edif/import_edif.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[65];
data/pcb-rnd-2.3.0/src_plugins/import_edif/import_edif.c:84:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	ret = ReadEdifNetlist((char *)fns[0]);
data/pcb-rnd-2.3.0/src_plugins/import_fpcb_nl/fpcb_nl.c:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *line, *curr, *next, *fp, *tn, buff[8192], signame[512];
data/pcb-rnd-2.3.0/src_plugins/import_fpcb_nl/fpcb_nl.c:102:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
						sprintf(signame, "pcbrndanonymous%d", anon++);
data/pcb-rnd-2.3.0/src_plugins/import_fpcb_nl/fpcb_nl.c:109:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(signame, line, len);
data/pcb-rnd-2.3.0/src_plugins/import_fpcb_nl/fpcb_nl.c:208:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char line[1024];
data/pcb-rnd-2.3.0/src_plugins/import_gnetlist/import_gnetlist.c:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[128], *s;
data/pcb-rnd-2.3.0/src_plugins/import_ipcd356/ipcd356.c:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char src[8192];
data/pcb-rnd-2.3.0/src_plugins/import_ipcd356/ipcd356.c:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[16];
data/pcb-rnd-2.3.0/src_plugins/import_ipcd356/ipcd356.c:108:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[16], *ends;
data/pcb-rnd-2.3.0/src_plugins/import_ipcd356/ipcd356.c:293:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line_[128], *line, netname[16], refdes[8], term[8];
data/pcb-rnd-2.3.0/src_plugins/import_ipcd356/ipcd356.c:344:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char tn[36];
data/pcb-rnd-2.3.0/src_plugins/import_ipcd356/ipcd356.c:463:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *s, line[1024];
data/pcb-rnd-2.3.0/src_plugins/import_ltspice/ltspice.c:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[1024];
data/pcb-rnd-2.3.0/src_plugins/import_ltspice/ltspice.c:102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/pcb-rnd-2.3.0/src_plugins/import_ltspice/ltspice.c:206:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/pcb-rnd-2.3.0/src_plugins/import_ltspice/ltspice.c:347:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *s, line[1024];
data/pcb-rnd-2.3.0/src_plugins/import_mentor_sch/netlist_helper.c:164:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024], *argv[8];
data/pcb-rnd-2.3.0/src_plugins/import_mentor_sch/netlist_helper.c:294:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char term[256];
data/pcb-rnd-2.3.0/src_plugins/import_net_action/import_net_action.c:62:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *s, *n, line[1024];
data/pcb-rnd-2.3.0/src_plugins/import_netlist/import_netlist.c:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char inputline[RND_MAX_NETLIST_LINE_LENGTH + 1];
data/pcb-rnd-2.3.0/src_plugins/import_netlist/import_netlist.c:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char temp[RND_MAX_NETLIST_LINE_LENGTH + 1];
data/pcb-rnd-2.3.0/src_plugins/import_orcad_net/orcad_net.c:182:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *s, line[1024];
data/pcb-rnd-2.3.0/src_plugins/import_pads_net/pads_net.c:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024], signal[1024];
data/pcb-rnd-2.3.0/src_plugins/import_pads_net/pads_net.c:195:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *s, line[1024];
data/pcb-rnd-2.3.0/src_plugins/import_protel_net/protel_net.c:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/pcb-rnd-2.3.0/src_plugins/import_protel_net/protel_net.c:220:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *s, line[1024];
data/pcb-rnd-2.3.0/src_plugins/import_pxm_pnm/import_pxm_pnm.c:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, line[1024];
data/pcb-rnd-2.3.0/src_plugins/import_pxm_pnm/import_pxm_pnm.c:116:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	pxm->sx = atoi(line);
data/pcb-rnd-2.3.0/src_plugins/import_pxm_pnm/import_pxm_pnm.c:117:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	pxm->sy = atoi(s);
data/pcb-rnd-2.3.0/src_plugins/import_pxm_pnm/import_pxm_pnm.c:131:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			if (atoi(line) != 255)
data/pcb-rnd-2.3.0/src_plugins/import_sch2/import_sch.c:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[32];
data/pcb-rnd-2.3.0/src_plugins/import_sch2/import_sch.c:65:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(tmp, "import::src%d", n);
data/pcb-rnd-2.3.0/src_plugins/import_sch2/import_sch_dlg.c:195:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char cwd[RND_PATH_MAX + 1];
data/pcb-rnd-2.3.0/src_plugins/import_tinycad/tinycad.c:90:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/pcb-rnd-2.3.0/src_plugins/import_tinycad/tinycad.c:218:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *s, line[1024];
data/pcb-rnd-2.3.0/src_plugins/import_ttf/ttf.c:408:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[17];
data/pcb-rnd-2.3.0/src_plugins/io_autotrax/read.c:155:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[MAXREAD], *t;
data/pcb-rnd-2.3.0/src_plugins/io_autotrax/read.c:205:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(line, "(empty text field)");
data/pcb-rnd-2.3.0/src_plugins/io_autotrax/read.c:239:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[MAXREAD];
data/pcb-rnd-2.3.0/src_plugins/io_autotrax/read.c:293:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[MAXREAD];
data/pcb-rnd-2.3.0/src_plugins/io_autotrax/read.c:437:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[MAXREAD];
data/pcb-rnd-2.3.0/src_plugins/io_autotrax/read.c:495:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[MAXREAD], *s;
data/pcb-rnd-2.3.0/src_plugins/io_autotrax/read.c:677:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[MAXREAD];
data/pcb-rnd-2.3.0/src_plugins/io_autotrax/read.c:836:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[MAXREAD];
data/pcb-rnd-2.3.0/src_plugins/io_autotrax/read.c:955:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char module_name[MAXREAD], module_refdes[MAXREAD], module_value[MAXREAD];
data/pcb-rnd-2.3.0/src_plugins/io_autotrax/read.c:961:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, line[MAXREAD];
data/pcb-rnd-2.3.0/src_plugins/io_autotrax/read.c:966:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(module_refdes, "unknown");
data/pcb-rnd-2.3.0/src_plugins/io_autotrax/read.c:971:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(module_name, "unknown");
data/pcb-rnd-2.3.0/src_plugins/io_autotrax/read.c:976:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(module_value, "unknown");
data/pcb-rnd-2.3.0/src_plugins/io_autotrax/read.c:1085:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/pcb-rnd-2.3.0/src_plugins/io_autotrax/read.c:1186:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024], *s;
data/pcb-rnd-2.3.0/src_plugins/io_autotrax/write.c:101:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[256];
data/pcb-rnd-2.3.0/src_plugins/io_autotrax/write.c:650:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[256];
data/pcb-rnd-2.3.0/src_plugins/io_bxl/bxl_lex.c:61:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 const char *bopat[MAXTAG];
data/pcb-rnd-2.3.0/src_plugins/io_bxl/bxl_lex.c:62:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 const char *eopat[MAXTAG];
data/pcb-rnd-2.3.0/src_plugins/io_bxl/bxl_lex.c:447:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[256];
data/pcb-rnd-2.3.0/src_plugins/io_bxl/bxl_lex.c:504:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	lval->un.i = atoi(ULX_BUF);
data/pcb-rnd-2.3.0/src_plugins/io_bxl/bxl_lex.h:24:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 const char *bopat[MAXTAG];
data/pcb-rnd-2.3.0/src_plugins/io_bxl/bxl_lex.h:25:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 const char *eopat[MAXTAG];
data/pcb-rnd-2.3.0/src_plugins/io_bxl/bxl_lex.h:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[256];
data/pcb-rnd-2.3.0/src_plugins/io_bxl/read.c:367:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[32];
data/pcb-rnd-2.3.0/src_plugins/io_bxl/read.c:368:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(tmp, "%d", ctx->state.pin_number);
data/pcb-rnd-2.3.0/src_plugins/io_bxl/read.c:437:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(ctx->state.attr_key, "refdes");
data/pcb-rnd-2.3.0/src_plugins/io_dsn/read.c:1744:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024], *s;
data/pcb-rnd-2.3.0/src_plugins/io_dsn/read.c:1779:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[12];
data/pcb-rnd-2.3.0/src_plugins/io_dsn/write.c:57:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	n = sprintf(dst, "%d__", (int)gid);
data/pcb-rnd-2.3.0/src_plugins/io_dsn/write.c:78:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char gname[GNAME_MAX];
data/pcb-rnd-2.3.0/src_plugins/io_dsn/write.c:96:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char gname[GNAME_MAX];
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1047:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src+offs, len);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1056:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&d, src+offs, sizeof(double));
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1084:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(end, "%ld", deg);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1091:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(end, "%ld", deg);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1123:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char block[8];
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1157:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char block[4];
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1159:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char DRC_block[244];
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1287:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char block[24];
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1292:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ind[256];
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1344:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buff[128];
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1348:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(buff, "%d", load_bmb(block, at->offs, at->len));
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1351:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(buff, "%ld", load_ubf(block, at->offs, at->len));
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1354:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(buff, "%ld", load_long(block, at->offs, at->len));
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1357:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(buff, "%f", load_double(block, at->offs, at->len));
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1452:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char itoa_buffer[64];
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1460:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		arc_flags = atoi(egb_node_prop_get(elem, "arc_negflags"));
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1463:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				x1 = fix_three_byte_read(atoi(e->value), arc_flags & 0x02);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1464:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(itoa_buffer, "%ld", x1);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1467:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				y1 = fix_three_byte_read(atoi(e->value), arc_flags & 0x04);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1468:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(itoa_buffer, "%ld", y1);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1471:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				x2 = fix_three_byte_read(atoi(e->value), arc_flags & 0x08);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1472:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(itoa_buffer, "%ld", x2);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1475:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				y2 = fix_three_byte_read(atoi(e->value), arc_flags & 0x10);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1476:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(itoa_buffer, "%ld", y2);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1479:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				c += fix_one_byte_read(atoi(e->value));
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1481:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				c += 256*fix_one_byte_read(atoi(e->value));
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1483:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				c += 256*256*fix_one_byte_read(atoi(e->value));
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1485:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				clockwise = atoi(e->value);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1500:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(itoa_buffer, "%ld", radius);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1502:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(itoa_buffer, "%ld", cx);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1504:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(itoa_buffer, "%ld", cy);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1541:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(itoa_buffer, "%ld", (long)(theta_1));
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1543:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(itoa_buffer, "%ld", (long)(delta_theta));
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1552:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				x1 = atoi(e->value);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1555:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				y1 = atoi(e->value);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1558:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				x2 = atoi(e->value);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1561:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				y2 = atoi(e->value);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1564:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				x1 = atoi(e->value);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1567:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				y1 = atoi(e->value);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1570:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				x2 = atoi(e->value);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1573:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				y2 = atoi(e->value);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1635:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(itoa_buffer, "%ld", radius);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1638:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(itoa_buffer, "%ld", cx);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1640:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(itoa_buffer, "%ld", cy);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1690:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int pin_idx = (int)(atoi(egb_node_prop_get(cr, "pin")));
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1701:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	lib = library_ref_by_idx(libraries, atoi(egb_node_prop_get(e, "library")));
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1705:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	pkg = package_ref_by_idx(lib, atoi(egb_node_prop_get(e, "package")));
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1772:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[32];
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1779:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				line_type = atoi(e->value);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1793:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				half_width = atoi(e->value);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1794:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(tmp, "%ld", half_width*2);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1801:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				half_width = atoi(e->value);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1802:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(tmp, "%ld", half_width*2);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1820:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[32];
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1827:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				arc_type = atoi(e->value);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1842:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				half_width = atoi(e->value);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1843:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(tmp, "%ld", half_width*2);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1858:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				half_width = atoi(e->value);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1859:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(tmp, "%ld", half_width*2);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1877:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[32];
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1882:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				half_width = atoi(e->value);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1883:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(tmp, "%ld", half_width*2);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1899:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *v, tmp[32];
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1929:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[32];
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1934:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				half_dx = atoi(e->value);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1935:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(tmp, "%ld", half_dx*2);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1938:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				half_dy = atoi(e->value);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1939:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(tmp, "%ld", half_dy*2);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1960:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[32];
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1967:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				half_drill = atoi(e->value);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1968:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(tmp, "%ld", half_drill*2);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1971:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				half_diameter = atoi(e->value);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1972:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(tmp, "%ld", half_diameter*2);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1975:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				half_size = atoi(e->value);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:1976:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(tmp, "%ld", half_size*2);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:2084:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						int element_num = atoi(e->value);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:2178:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[32];
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:2185:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(tmp, "%ldmil", egb_ctx->mdWireWire);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:2190:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(tmp, "%ldmil", egb_ctx->msWidth);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:2195:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(tmp, "%f", egb_ctx->rvPadTop);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:2200:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(tmp, "%f", egb_ctx->rvPadInner);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/eagle_bin.c:2205:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(tmp, "%f", egb_ctx->rvPadBottom);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/read.c:191:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/pcb-rnd-2.3.0/src_plugins/io_eagle/read.c:209:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buff[2];
data/pcb-rnd-2.3.0/src_plugins/io_eagle/read.c:532:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char half[256] = {0};
data/pcb-rnd-2.3.0/src_plugins/io_eagle/read.c:1363:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char conn[256];
data/pcb-rnd-2.3.0/src_plugins/io_eagle/read_dru.c:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[256], *s;
data/pcb-rnd-2.3.0/src_plugins/io_eagle/read_dru.c:168:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[256];
data/pcb-rnd-2.3.0/src_plugins/io_eagle/read_dru.c:178:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tmp, prefix, sizeof(prefix));
data/pcb-rnd-2.3.0/src_plugins/io_eagle/read_dru.c:190:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				num_layers = atoi(v);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/read_dru.c:210:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(tmp + sizeof(prefix) - 1, k, len+1);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/read_dru.c:225:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(tmp, "signal_%d", n);
data/pcb-rnd-2.3.0/src_plugins/io_hyp/hyp_l.c:3479:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
{ BEGIN INITIAL; hyylval.intval = atoi(hyytext); return H_POSINT; }
data/pcb-rnd-2.3.0/src_plugins/io_hyp/hyp_y.c:1482:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char const *yyarg[YYERROR_VERBOSE_ARGS_MAXIMUM];
data/pcb-rnd-2.3.0/src_plugins/io_hyp/hyp_y.c:1671:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char yymsgbuf[128];
data/pcb-rnd-2.3.0/src_plugins/io_hyp/io_hyp.c:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/pcb-rnd-2.3.0/src_plugins/io_hyp/parser.c:397:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char conn[MAX_STRING];
data/pcb-rnd-2.3.0/src_plugins/io_hyp/parser.c:859:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char new_layer_name[MAX_STRING];
data/pcb-rnd-2.3.0/src_plugins/io_hyp/parser.c:1604:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char value[128];
data/pcb-rnd-2.3.0/src_plugins/io_hyp/write.c:120:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(wr->elem_name, orig, len + 1);
data/pcb-rnd-2.3.0/src_plugins/io_hyp/write.c:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dt[128];
data/pcb-rnd-2.3.0/src_plugins/io_hyp/write.c:224:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char name[16];
data/pcb-rnd-2.3.0/src_plugins/io_hyp/write.c:237:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(name, "proto_%ld", id);
data/pcb-rnd-2.3.0/src_plugins/io_hyp/write.c:427:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[128];
data/pcb-rnd-2.3.0/src_plugins/io_hyp/write.c:429:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(tmp, "dielectric layer %d", n);
data/pcb-rnd-2.3.0/src_plugins/io_kicad/read.c:1396:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		lnum = atoi(n->str);
data/pcb-rnd-2.3.0/src_plugins/io_kicad/read.c:2801:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024], *s;
data/pcb-rnd-2.3.0/src_plugins/io_kicad/read.c:2860:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[8];
data/pcb-rnd-2.3.0/src_plugins/io_kicad/read_net.c:132:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char refpin[256];
data/pcb-rnd-2.3.0/src_plugins/io_kicad/read_net.c:256:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *s, line[1024];
data/pcb-rnd-2.3.0/src_plugins/io_kicad/uniq_name.c:64:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(end, head, l1); end += l1;
data/pcb-rnd-2.3.0/src_plugins/io_kicad/uniq_name.c:65:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(end, state->suffix_sep, l2); end += l2;
data/pcb-rnd-2.3.0/src_plugins/io_kicad/uniq_name.c:72:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(end, "%lu", state->ctr++);
data/pcb-rnd-2.3.0/src_plugins/io_kicad/write.c:57:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[32];             /* kicad layer name */
data/pcb-rnd-2.3.0/src_plugins/io_lihata/read.c:363:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char val[8], *end;
data/pcb-rnd-2.3.0/src_plugins/io_lihata/read.c:834:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[128];
data/pcb-rnd-2.3.0/src_plugins/io_lihata/read.c:844:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buff, "ulzw.%ld", ID);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/read.c:1812:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(g->name, "grp_%ld", gid);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/read.c:2298:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(s->name, stn->name, name_len+1);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/read.c:2476:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	rctx->rdver = atoi(nd->name+15);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/read.c:2619:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		rctx.rdver = atoi(doc->root->name+20);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/read.c:2662:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		rctx.rdver = atoi(doc->root->name+16);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/read.c:2849:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	rctx.rdver = atoi(doc->root->name+20);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/read.c:2912:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[23];
data/pcb-rnd-2.3.0/src_plugins/io_lihata/read.c:2938:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[10];
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:336:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[128];
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:339:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buff, "line.%ld", (local_id >= 0 ? local_id : line->ID));
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:362:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[128];
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:365:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buff, "simplearc.%ld", (local_id >= 0 ? local_id : arc->ID));
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:380:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[128];
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:385:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buff, "simplepoly.%ld", (local_id >= 0 ? local_id : poly->ID));
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:398:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[128];
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:400:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buff, "rat.%ld", rat->ID);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:424:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[128];
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:427:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buff, "arc.%ld", arc->ID);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:476:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[128], *tbuff;
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:481:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buff, "ulzw.%ld", ID);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:578:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[128];
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:581:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buff, "gfx.%ld", gfx->ID);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:606:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[128];
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:643:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[128];
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:655:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buff, "pad.%ld", ps->ID);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:682:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[128];
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:686:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buff, "polygon.%ld", poly->ID);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:739:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[128], *av;
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:742:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buff, "text.%ld", text->ID);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:811:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[128];
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:824:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buff, "element.%ld", subc->ID);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:915:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[128];
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:921:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buff, "subc.%ld", sc->ID);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:952:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[64];
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:959:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(tmp, "ps_proto_v4.%ld", pid);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:961:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(tmp, "ps_proto_v6.%ld", pid);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:1064:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[128];
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:1068:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buff, "padstack_ref.%ld", ps->ID);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:1086:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[64];
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:1088:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(tmp, "%ld", n);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:1113:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[32];
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:1114:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(tmp, "%d", n);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:1410:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *sid, sidbuff[64];
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:1414:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sidbuff, "%ld", font->id);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:1433:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char sname[32];
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:1437:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(sname, "&%02x", n);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:1681:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char vers[32];
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:1685:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(vers, "pcb-rnd-board-v%d", wrver);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:1791:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(end-11, ".lht.pcb");
data/pcb-rnd-2.3.0/src_plugins/io_mentor_cell/read.c:1309:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, line[1024];
data/pcb-rnd-2.3.0/src_plugins/io_mentor_cell/read.c:1358:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *end, fn2[RND_PATH_MAX];
data/pcb-rnd-2.3.0/src_plugins/io_mentor_cell/read.c:1379:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(end, "Padstack.hkp");
data/pcb-rnd-2.3.0/src_plugins/io_mentor_cell/read.c:1405:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(end, "NetClass.hkp");
data/pcb-rnd-2.3.0/src_plugins/io_mentor_cell/read.c:1411:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(end, "NetProps.hkp");
data/pcb-rnd-2.3.0/src_plugins/io_mentor_cell/read.c:1447:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024], *s;
data/pcb-rnd-2.3.0/src_plugins/io_mentor_cell/read_net.c:111:68:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		gid = pcb_layergrp_step(ctx->pcb, pcb_layergrp_get_top_copper(), atoi(nln->argv[1])-1, PCB_LYT_COPPER);
data/pcb-rnd-2.3.0/src_plugins/io_pcb/attribs.c:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char apath[512], *path, *pe;
data/pcb-rnd-2.3.0/src_plugins/io_pcb/attribs.c:57:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(apath, conf_attr_prefix, conf_attr_prefix_len);
data/pcb-rnd-2.3.0/src_plugins/io_pcb/attribs.c:61:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(path, path1, path1l);
data/pcb-rnd-2.3.0/src_plugins/io_pcb/file.c:148:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[100];
data/pcb-rnd-2.3.0/src_plugins/io_pcb/file.c:159:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(bufp, "%d", i);
data/pcb-rnd-2.3.0/src_plugins/io_pcb/file.c:164:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(bufp, "%06d", f);
data/pcb-rnd-2.3.0/src_plugins/io_pcb/file.c:173:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[(PCB_MAX_LAYER + 2) * 5 + 1];
data/pcb-rnd-2.3.0/src_plugins/io_pcb/file.c:192:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(cp, "%ld", layer + 1);
data/pcb-rnd-2.3.0/src_plugins/io_pcb/file.c:463:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				rdir = atoi(tmp);
data/pcb-rnd-2.3.0/src_plugins/io_pcb/file.c:466:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				rscale = atoi(tmp);
data/pcb-rnd-2.3.0/src_plugins/io_pcb/file.c:839:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/pcb-rnd-2.3.0/src_plugins/io_pcb/file.c:1074:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[128];
data/pcb-rnd-2.3.0/src_plugins/io_pcb/file.c:1079:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(tmp, "%d", Direction);
data/pcb-rnd-2.3.0/src_plugins/io_pcb/file.c:1081:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(tmp, "%d", TextScale);
data/pcb-rnd-2.3.0/src_plugins/io_pcb/file.c:1270:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char s[8];
data/pcb-rnd-2.3.0/src_plugins/io_pcb/parse_y.c:1416:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char const *yyarg[YYERROR_VERBOSE_ARGS_MAXIMUM];
data/pcb-rnd-2.3.0/src_plugins/io_pcb/parse_y.c:1605:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char yymsgbuf[128];
data/pcb-rnd-2.3.0/src_plugins/io_pcb/parse_y.c:2740:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char	p_number[8];
data/pcb-rnd-2.3.0/src_plugins/io_pcb/parse_y.c:2742:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(p_number, "%d", pin_num++);
data/pcb-rnd-2.3.0/src_plugins/io_pcb/parse_y.c:2755:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char	p_number[8];
data/pcb-rnd-2.3.0/src_plugins/io_pcb/parse_y.c:2762:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(p_number, "%d", pin_num++);
data/pcb-rnd-2.3.0/src_plugins/io_pcb/parse_y.c:2812:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char		p_number[8];
data/pcb-rnd-2.3.0/src_plugins/io_pcb/parse_y.c:2814:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(p_number, "%d", pin_num++);
data/pcb-rnd-2.3.0/src_plugins/io_pcb/parse_y.c:3355:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/pcb-rnd-2.3.0/src_plugins/io_pcb/parse_y.c:3362:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/common_inlines.h:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char constr[4], *end, *tmp;
data/pcb-rnd-2.3.0/src_plugins/io_tedax/footprint.c:74:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buff, "%p", (void *)obj); \
data/pcb-rnd-2.3.0/src_plugins/io_tedax/footprint.c:444:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[128];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/footprint.c:651:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[520];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/footprint.c:652:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *argv[16];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/footprint.c:698:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, line[515];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/io_tedax.c:277:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[515], *s;
data/pcb-rnd-2.3.0/src_plugins/io_tedax/stackup.c:57:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void gen_layer_name(tedax_stackup_t *ctx, char dst[65], const char *name, int prefix, rnd_layergrp_id_t gid)
data/pcb-rnd-2.3.0/src_plugins/io_tedax/stackup.c:63:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		l = sprintf(dst, "%ld.", gid);
data/pcb-rnd-2.3.0/src_plugins/io_tedax/stackup.c:68:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		l = sprintf(dst, "%d_", prefix);
data/pcb-rnd-2.3.0/src_plugins/io_tedax/stackup.c:196:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp[64];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/stackup.c:294:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tname[66], *tn;
data/pcb-rnd-2.3.0/src_plugins/io_tedax/stackup.c:409:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[520];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/stackup.c:410:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *argv[16];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/tboard.c:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char fpname[256];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/tboard.c:94:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char fpname[256];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/tboard.c:165:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char fpname[256];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/tboard.c:174:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char fpname[256], refdes[256];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/tboard.c:190:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(refdes, "ANON%ld", subc->ID);
data/pcb-rnd-2.3.0/src_plugins/io_tedax/tboard.c:417:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			swapside = atoi(argv[6]);
data/pcb-rnd-2.3.0/src_plugins/io_tedax/tboard.c:533:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[520];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/tboard.c:534:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *argv[16];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/tdrc.c:243:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char val[128];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/tdrc.c:309:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[520], *argv[16];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/tdrc_query.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[520], *argv[4];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/tdrc_query.c:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[520], *argv[4];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/tdrc_query.c:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[520], *argv[16];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/tlayer.c:111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lntmp[64];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/tlayer.c:125:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(lntmp, "anon_%ld", gid);
data/pcb-rnd-2.3.0/src_plugins/io_tedax/tlayer.c:253:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[520];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/tlayer.c:254:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *argv[16], *end;
data/pcb-rnd-2.3.0/src_plugins/io_tedax/tnetlist.c:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[520];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/tnetlist.c:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *argv[16];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/tnetlist.c:97:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char id[512];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/tnetlist.c:102:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char id[512];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/trouter.c:205:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[520];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/trouter.c:206:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *argv[16];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/trouter.c:339:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[520];
data/pcb-rnd-2.3.0/src_plugins/io_tedax/trouter.c:340:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *argv[16], *end;
data/pcb-rnd-2.3.0/src_plugins/lib_compat_help/pstk_compat.c:182:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&shape[n], &copper_master, sizeof(copper_master));
data/pcb-rnd-2.3.0/src_plugins/lib_compat_help/pstk_compat.c:195:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&shape[tshp.len+0], &mask_master, sizeof(mask_master));
data/pcb-rnd-2.3.0/src_plugins/lib_compat_help/pstk_compat.c:196:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&shape[tshp.len+1], &mask_master, sizeof(mask_master));
data/pcb-rnd-2.3.0/src_plugins/lib_formula/bisect.c:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sunit[32];
data/pcb-rnd-2.3.0/src_plugins/lib_formula/test/glue.c:5:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *rnd_menu_file_paths[4];
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/act.c:192:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[256], name2[256];
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layer_menu.c:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char act[256], chk[256];
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layer_menu.c:74:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(act, "ToggleView(ui:%d)", idx);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layer_menu.c:75:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(chk, "ChkView(ui:%d)", idx);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layer_menu.c:147:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(act, "ToggleView(%ld)", lid+1);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layer_menu.c:148:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(chk, "ChkView(%ld)", lid+1);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layer_menu.c:151:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(act, "SelectLayer(%ld)", lid+1);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layer_menu.c:152:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(chk, "ChkLayer(%ld)", lid+1);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layer_menu.c:190:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char act[256];
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layersel.c:164:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[32][20];
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layersel.c:165:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *xpm[32];
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layersel.c:339:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		lgs->is_open = !!g->open;
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layersel.c:505:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(dst->buf[line++], ".	c None");
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layersel.c:506:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(dst->buf[line++], "u	c None");
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layersel.c:507:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(dst->buf[line++], "b	c #000000");
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/routest.c:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char act[256], chk[256], *path, *end;
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/routest.c:85:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(act, "RouteStyle(%d)", idx+1); /* for historical reasons this action counts from 1 */
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/routest.c:86:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(chk, "ChkRst(%d)", idx);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/routest_dlg.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[PCB_RST_NAME_LEN];
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/routest_dlg.c:97:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *cell[3]= {NULL};
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/status.c:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char kbd[128];
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/status.c:69:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(kbd, "(last: ", 7);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/status.c:71:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(kbd+len+7, ")", 2);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/status.c:465:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ids[64];
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/status.c:509:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(ids, "#%ld", subc->ID);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/status.c:511:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(ids, "#%ld", obj->ID);
data/pcb-rnd-2.3.0/src_plugins/millpath/toolpath.c:509:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			if (argc > 1) tool = atoi(argv[1]);
data/pcb-rnd-2.3.0/src_plugins/millpath/toolpath.c:518:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			if (argc > 1) tool = atoi(argv[1]);
data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/graph.c:45:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(o->adj, g->adj, size);
data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/load.c:44:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *node2name[MAXNODES] = {NULL};
data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/load.c:90:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static char id[NAMELEN];
data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/load.c:202:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char cmd[6];
data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/load.c:208:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char s[1024]; /* will break for comment lines longer than 1k */
data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/solve.c:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fn[512];
data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/solve.c:159:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(fn, "contraction_%02d_%02d", solution, cnt);
data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/solve.c:168:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char fn[128];
data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/solve.c:169:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(fn, "contraction_%02d", solution);
data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/solve.c:252:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(best_cuts, cuts, cuts_size);
data/pcb-rnd-2.3.0/src_plugins/mincut/rats_mincut.c:276:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char gfn[256];
data/pcb-rnd-2.3.0/src_plugins/mincut/rats_mincut.c:278:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(gfn, "A_%d_a", drw);
data/pcb-rnd-2.3.0/src_plugins/order/order.h:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[1];           /* dynamic length */
data/pcb-rnd-2.3.0/src_plugins/order_pcbway/pcbway.c:93:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *hdr[5];
data/pcb-rnd-2.3.0/src_plugins/order_pcbway/pcbway.c:247:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				f->val.lng = atoi(dflt);
data/pcb-rnd-2.3.0/src_plugins/order_pcbway/pcbway.c:419:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp[128];
data/pcb-rnd-2.3.0/src_plugins/order_pcbway/pcbway.c:423:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(tmp, "$%.2f    ", shipcost+cost);
data/pcb-rnd-2.3.0/src_plugins/order_pcbway/pcbway.c:506:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *hdr[5];
data/pcb-rnd-2.3.0/src_plugins/propedit/propdlg.c:106:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *cell[6] = {NULL};
data/pcb-rnd-2.3.0/src_plugins/propedit/propdlg.c:273:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[3] = {NULL, NULL, NULL};
data/pcb-rnd-2.3.0/src_plugins/propedit/propsel.c:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char small[256];
data/pcb-rnd-2.3.0/src_plugins/propedit/propsel.c:111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[256], *end;
data/pcb-rnd-2.3.0/src_plugins/propedit/propsel.c:113:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(name, "p/flags/");
data/pcb-rnd-2.3.0/src_plugins/puller/puller.c:1046:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&etmp, &e->start, sizeof(End));
data/pcb-rnd-2.3.0/src_plugins/puller/puller.c:1047:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&e->start, &e->end, sizeof(End));
data/pcb-rnd-2.3.0/src_plugins/puller/puller.c:1048:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&e->end, &etmp, sizeof(End));
data/pcb-rnd-2.3.0/src_plugins/puller/puller.c:1063:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&etmp, &e->start, sizeof(End));
data/pcb-rnd-2.3.0/src_plugins/puller/puller.c:1064:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&e->start, &e->end, sizeof(End));
data/pcb-rnd-2.3.0/src_plugins/puller/puller.c:1065:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&e->end, &etmp, sizeof(End));
data/pcb-rnd-2.3.0/src_plugins/query/dlg_search_edit.c:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[2], *cursor_path = NULL;
data/pcb-rnd-2.3.0/src_plugins/query/dlg_search_edit.c:120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[2];
data/pcb-rnd-2.3.0/src_plugins/query/dlg_search_edit.c:228:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[2];
data/pcb-rnd-2.3.0/src_plugins/query/fnc_layer_setup.c:145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[1024];
data/pcb-rnd-2.3.0/src_plugins/query/fnc_list.c:86:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				case PCBQ_VT_STRING: str = (char *)argv[n+1].data.str; break;
data/pcb-rnd-2.3.0/src_plugins/query/fnc_list.c:110:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&tmp->val, val, sizeof(pcb_qry_val_t));
data/pcb-rnd-2.3.0/src_plugins/query/net_len.c:225:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	for(n = 0; n < fctx->open.used; n++) {
data/pcb-rnd-2.3.0/src_plugins/query/net_len.c:226:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		pcb_any_obj_t *o = fctx->open.array[n];
data/pcb-rnd-2.3.0/src_plugins/query/net_len.c:230:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			vtp0_remove(&fctx->open, n, 1);
data/pcb-rnd-2.3.0/src_plugins/query/query.h:69:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmp[4];
data/pcb-rnd-2.3.0/src_plugins/query/query_act.c:421:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fname[64], *fno;
data/pcb-rnd-2.3.0/src_plugins/query/query_exec.c:779:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buff[128];
data/pcb-rnd-2.3.0/src_plugins/query/query_y.c:156:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(res, prep, l2);
data/pcb-rnd-2.3.0/src_plugins/query/query_y.c:158:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(res+l2+1, orig, l1+1);
data/pcb-rnd-2.3.0/src_plugins/query/query_y.c:1127:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char const *yyarg[YYERROR_VERBOSE_ARGS_MAXIMUM];
data/pcb-rnd-2.3.0/src_plugins/query/query_y.c:1317:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char yymsgbuf[128];
data/pcb-rnd-2.3.0/src_plugins/query/query_y.c:1855:91:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { (yyval.n) = pcb_qry_n_alloc(PCBQ_FIELD); (yyval.n)->data.str = attrib_prepend_free((char *)(yyvsp[0].n)->data.str, (yyvsp[-2].s), '.'); }
data/pcb-rnd-2.3.0/src_plugins/query/query_y.c:2078:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		htsp_set(user_funcs, (char *)(yyvsp[-2].n)->data.str, (yyval.n));
data/pcb-rnd-2.3.0/src_plugins/query/query_y.c:2092:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char *old = (char *)(yyvsp[0].n)->data.str, *sep = ((*old != '\0') ? " " : "");
data/pcb-rnd-2.3.0/src_plugins/renumber/renumber.c:281:78:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				pcb_undo_add_obj_to_change_name(PCB_OBJ_SUBC, NULL, NULL, subc_list[i], (char *)or_empty(subc_list[i]->refdes));
data/pcb-rnd-2.3.0/src_plugins/renumber/renumberblock.c:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char num_buf[15];
data/pcb-rnd-2.3.0/src_plugins/renumber/renumberblock.c:55:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		num = atoi(refdes_split);
data/pcb-rnd-2.3.0/src_plugins/renumber/renumberblock.c:57:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(num_buf, "%d", num);
data/pcb-rnd-2.3.0/src_plugins/renumber/renumberblock.c:59:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(new_ref, old_ref, refdes_split - old_ref);
data/pcb-rnd-2.3.0/src_plugins/renumber/renumberblock.c:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char num_buf[15];
data/pcb-rnd-2.3.0/src_plugins/renumber/renumberblock.c:100:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		num = atoi(refdes_split);
data/pcb-rnd-2.3.0/src_plugins/renumber/renumberblock.c:102:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(num_buf, "%d", num);
data/pcb-rnd-2.3.0/src_plugins/renumber/renumberblock.c:104:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(new_ref, old_ref, refdes_split - old_ref);
data/pcb-rnd-2.3.0/src_plugins/report/drill.c:151:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(d->Drill[i].hole + d->Drill[i].PinN, d->Drill[i + 1].hole, d->Drill[i + 1].PinN * sizeof(pcb_any_obj_t *));
data/pcb-rnd-2.3.0/src_plugins/report/report.c:531:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[50];
data/pcb-rnd-2.3.0/src_plugins/report/report.c:594:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[50];
data/pcb-rnd-2.3.0/src_plugins/report/report.c:734:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[50];
data/pcb-rnd-2.3.0/src_plugins/report/report.c:809:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[256];
data/pcb-rnd-2.3.0/src_plugins/script/live_script.c:108:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char fn[RND_PATH_MAX*2], *fn_end;
data/pcb-rnd-2.3.0/src_plugins/script/live_script.c:117:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fn, *path, dirlen);
data/pcb-rnd-2.3.0/src_plugins/script/live_script.c:125:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char *s1, *s2, *eng, *s, *end, line[1024];
data/pcb-rnd-2.3.0/src_plugins/script/perma.c:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char spath[RND_PATH_MAX];
data/pcb-rnd-2.3.0/src_plugins/script/perma.c:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[RND_PATH_MAX], *errmsg;
data/pcb-rnd-2.3.0/src_plugins/script/script.c:277:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[RND_PATH_MAX];
data/pcb-rnd-2.3.0/src_plugins/script/script_act.c:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[2];
data/pcb-rnd-2.3.0/src_plugins/script/script_act.c:112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *cell[4], *cursor_path = NULL;
data/pcb-rnd-2.3.0/src_plugins/script/timer.c:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char aname[1];
data/pcb-rnd-2.3.0/src_plugins/script/timer.c:135:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fn[RND_ACTION_NAME_MAX];
data/pcb-rnd-2.3.0/src_plugins/shape/shape.c:384:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *args[6];
data/pcb-rnd-2.3.0/src_plugins/shape/shape.c:454:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *args[8];
data/pcb-rnd-2.3.0/src_plugins/shape/shape.c:569:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *args[6];
data/pcb-rnd-2.3.0/src_plugins/sketch_route/sketch_route.c:695:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[256];
data/pcb-rnd-2.3.0/src_plugins/sketch_route/wire.c:41:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, sizeof(wire_point_t));
data/pcb-rnd-2.3.0/src_plugins/sketch_route/wire.c:44:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst->points, src->points, src->point_num*sizeof(wire_point_t));
data/pcb-rnd-2.3.0/src_plugins/vendordrill/vendor.c:101:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[128];
data/pcb-rnd-2.3.0/tests/base64/main.c:11:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bin[512];
data/pcb-rnd-2.3.0/tests/base64/main.c:12:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char plain[256];
data/pcb-rnd-2.3.0/tests/conf/conftest.c:194:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[128];
data/pcb-rnd-2.3.0/tests/conf/conftest.c:223:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[128];
data/pcb-rnd-2.3.0/tests/conf/conftest.c:310:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char line[8192];
data/pcb-rnd-2.3.0/tests/pcb-printf/tester.c:7:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[8192];
data/pcb-rnd-2.3.0/tests/pcb-printf/tester.c:39:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char fmt_tmp[32];
data/pcb-rnd-2.3.0/util/bxl2txt/txt2bxl.c:53:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(argv[1], "wb");
data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/glue.c:33:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *rnd_menu_file_paths[4];
data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/gsch2pcb.c:215:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *s, buf[1024], config[32], arg[768];
data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/gsch2pcb.c:299:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmp[64];
data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/gsch2pcb.c:300:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(tmp, "%ld", conf_g2pr.utils.gsch2pcb_rnd.verbose + 1);
data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/run.c:90:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char *cmd, *end, line[1024];
data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/run.c:101:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(end, args.array[i], l);
data/pcb-rnd-2.3.0/scconfig/src/c99/find_c99.c:49:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (((out == NULL) && (iscross)) || (strncmp(out, expected, strlen(expected)) == 0)) {
data/pcb-rnd-2.3.0/scconfig/src/default/arg.c:97:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					if (((a->arg[0] == '^') && (strncmp(a->arg+1, key, strlen(a->arg+1)) == 0)) || (strcmp(a->arg, key) == 0)) {
data/pcb-rnd-2.3.0/scconfig/src/default/db.c:52:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l1   = strlen(orig);
data/pcb-rnd-2.3.0/scconfig/src/default/db.c:53:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l2   = strlen(value);
data/pcb-rnd-2.3.0/scconfig/src/default/db.c:79:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(first_level_dir, key, fld_len);
data/pcb-rnd-2.3.0/scconfig/src/default/db.c:309:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(strlen(key) + strlen(db_cwd) < sizeof(tmp)-1); \
data/pcb-rnd-2.3.0/scconfig/src/default/db.c:309:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(strlen(key) + strlen(db_cwd) < sizeof(tmp)-1); \
data/pcb-rnd-2.3.0/scconfig/src/default/db.c:408:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		totallen = strlen(prefix);
data/pcb-rnd-2.3.0/scconfig/src/default/db.c:418:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(value);
data/pcb-rnd-2.3.0/scconfig/src/default/dep.c:55:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(name_);
data/pcb-rnd-2.3.0/scconfig/src/default/dep.c:69:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				*missing = !strlen(val);
data/pcb-rnd-2.3.0/scconfig/src/default/dep.c:79:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sep = tmp + strlen(tmp) - 1;
data/pcb-rnd-2.3.0/scconfig/src/default/dep.c:191:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(needtodo);
data/pcb-rnd-2.3.0/scconfig/src/default/dep.c:211:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(path);
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:41:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (((out == NULL) && (iscross)) || (strncmp(out, expected, strlen(expected)) == 0)) {
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:57:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (((out == NULL) && (iscross)) || (strncmp(out, expected_bad, strlen(expected_bad)) != 0)) {
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:118:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(target);
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:240:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			end = name + strlen(name);
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:794:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cflags_c = malloc(strlen(cflags) + 8 + strlen(fpic));
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:794:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cflags_c = malloc(strlen(cflags) + 8 + strlen(fpic));
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:904:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(lib_filename) - strlen(libname_ext);
data/pcb-rnd-2.3.0/scconfig/src/default/find_cc.c:904:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(lib_filename) - strlen(libname_ext);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:49:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(command) + strlen(src_esc) + strlen(dst_esc) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:49:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(command) + strlen(src_esc) + strlen(dst_esc) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:49:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(command) + strlen(src_esc) + strlen(dst_esc) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:108:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(command) + strlen(src_esc) + strlen(dst_esc) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:108:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(command) + strlen(src_esc) + strlen(dst_esc) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:108:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(command) + strlen(src_esc) + strlen(dst_esc) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:153:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(command) + strlen(dir_esc) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:153:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(command) + strlen(dir_esc) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:158:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	file = malloc(strlen(dir) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:173:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(dir) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:214:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(command) + strlen(src_esc) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:214:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(command) + strlen(src_esc) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:250:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(command) + strlen(src_esc) + strlen(dst_esc) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:250:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(command) + strlen(src_esc) + strlen(dst_esc) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:250:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(command) + strlen(src_esc) + strlen(dst_esc) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:268:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ret = strncmp(expected, result, strlen(expected)) == 0;
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:294:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(command) + strlen(obj_esc) + strlen(archive_esc) + 64);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:294:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(command) + strlen(obj_esc) + strlen(archive_esc) + 64);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:294:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(command) + strlen(obj_esc) + strlen(archive_esc) + 64);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:369:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((out != NULL) && (strncmp(out, test_str, strlen(test_str)) == 0)) {
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:397:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((out != NULL) && (strncmp(out, test_str_out, strlen(test_str_out)) == 0)) {
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:416:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(command) + strlen(tmp_esc) + 16);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:416:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(command) + strlen(tmp_esc) + 16);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:617:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(target);
data/pcb-rnd-2.3.0/scconfig/src/default/find_fstools.c:666:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(target);
data/pcb-rnd-2.3.0/scconfig/src/default/find_libs.c:35:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cflags = malloc(strlen(dlc) + 64);
data/pcb-rnd-2.3.0/scconfig/src/default/find_libs.c:36:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ldflags = malloc(strlen(dlc)*2 + 256);
data/pcb-rnd-2.3.0/scconfig/src/default/find_printf.c:39:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strncmp(out, expected, strlen(expected)) == 0) {
data/pcb-rnd-2.3.0/scconfig/src/default/find_signal.c:103:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pathend = path + strlen(prefix);
data/pcb-rnd-2.3.0/scconfig/src/default/find_sys.c:187:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			end = cwd + strlen(cwd) - 1;
data/pcb-rnd-2.3.0/scconfig/src/default/find_sys.c:233:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	c = tmp[strlen(tmp)-1];
data/pcb-rnd-2.3.0/scconfig/src/default/find_sys.c:250:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		t = malloc(strlen(tmp) * 2);
data/pcb-rnd-2.3.0/scconfig/src/default/find_sys.c:382:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(test) + strlen(shell) + 8);
data/pcb-rnd-2.3.0/scconfig/src/default/find_sys.c:382:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(test) + strlen(shell) + 8);
data/pcb-rnd-2.3.0/scconfig/src/default/find_sys.c:437:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			res = strncmp(start, t[1], strlen(t[1]));
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:53:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		start = test_c + strlen(inc);
data/pcb-rnd-2.3.0/scconfig/src/default/find_types.c:261:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	nodeend = node + strlen(node);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_compile.c:51:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = strlen(s);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_compile.c:52:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				output = malloc(len + strlen(input) + 4);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_compile.c:180:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	out = malloc(strlen(in)*2+1);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_compile.c:241:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(emu) + strlen(cmd_) + strlen(fn_out_esc) + strlen(temp_out_esc) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_compile.c:241:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(emu) + strlen(cmd_) + strlen(fn_out_esc) + strlen(temp_out_esc) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_compile.c:241:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(emu) + strlen(cmd_) + strlen(fn_out_esc) + strlen(temp_out_esc) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_compile.c:241:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(emu) + strlen(cmd_) + strlen(fn_out_esc) + strlen(temp_out_esc) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_compile.c:286:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(emu) + strlen(shell) + strlen(cmd_esc) + 16);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_compile.c:286:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(emu) + strlen(shell) + strlen(cmd_esc) + 16);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_compile.c:286:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(emu) + strlen(shell) + strlen(cmd_esc) + 16);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_compile.c:325:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(temp) + strlen(interpreter) + 4);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_compile.c:325:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(temp) + strlen(interpreter) + 4);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_file.c:52:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(suffix) > sizeof(s) - strlen(tmp) - 32) {
data/pcb-rnd-2.3.0/scconfig/src/default/lib_file.c:52:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(suffix) > sizeof(s) - strlen(tmp) - 32) {
data/pcb-rnd-2.3.0/scconfig/src/default/lib_file.c:69:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			cmd = malloc(strlen(s_esc) + strlen(mkdir) + 16);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_file.c:69:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			cmd = malloc(strlen(s_esc) + strlen(mkdir) + 16);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_file.c:92:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(suffix) > sizeof(s) - strlen(tmp) - 32) {
data/pcb-rnd-2.3.0/scconfig/src/default/lib_file.c:92:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(suffix) > sizeof(s) - strlen(tmp) - 32) {
data/pcb-rnd-2.3.0/scconfig/src/default/lib_file.c:169:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tmp = malloc(strlen(path_esc) + 16);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_file.c:193:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	path = malloc(strlen(dir) + strlen(file) + 5);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_file.c:193:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	path = malloc(strlen(dir) + strlen(file) + 5);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_filelist.c:47:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(dir) + strlen(rm) + 4);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_filelist.c:47:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(dir) + strlen(rm) + 4);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_filelist.c:66:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fn = malloc(strlen(dir) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_filelist.c:84:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(dir) + 64);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_filelist.c:151:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(dir);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_filelist.c:219:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(dir) + strlen(list_cmd) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_filelist.c:219:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(dir) + strlen(list_cmd) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_pkg_config.c:33:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(confname) + strlen(pkgname) > sizeof(cmd) - 16) {
data/pcb-rnd-2.3.0/scconfig/src/default/lib_pkg_config.c:33:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(confname) + strlen(pkgname) > sizeof(cmd) - 16) {
data/pcb-rnd-2.3.0/scconfig/src/default/lib_pkg_config.c:88:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(confname) + strlen(pkgname) > sizeof(cmd) - 16) {
data/pcb-rnd-2.3.0/scconfig/src/default/lib_pkg_config.c:88:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(confname) + strlen(pkgname) > sizeof(cmd) - 16) {
data/pcb-rnd-2.3.0/scconfig/src/default/lib_srctree.c:36:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int keylen = strlen(key);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:26:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		l = strlen(includes);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:58:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			tmp = malloc(strlen(prefix) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:143:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((prefix == NULL) ? 0 : strlen(prefix) + strlen(db_cwd) > sizeof(apath)-32) {
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:143:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((prefix == NULL) ? 0 : strlen(prefix) + strlen(db_cwd) > sizeof(apath)-32) {
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:271:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tmp = malloc(strlen(prefix) + 32);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:342:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(key) > sizeof(path)-32) {
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:383:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(fieldn) + strlen(structn) + strlen(test_c_in) + 32 >= sizeof(test_c)) {
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:383:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(fieldn) + strlen(structn) + strlen(test_c_in) + 32 >= sizeof(test_c)) {
data/pcb-rnd-2.3.0/scconfig/src/default/lib_try.c:383:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(fieldn) + strlen(structn) + strlen(test_c_in) + 32 >= sizeof(test_c)) {
data/pcb-rnd-2.3.0/scconfig/src/default/lib_uniqinc.c:137:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(*arr);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_uniqinc.c:164:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = strlen(arr[ndx]);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_uniqinc.c:187:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	oseplen = strlen(osep);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_uniqinc.c:195:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len += strlen(*s) + oseplen + 1;
data/pcb-rnd-2.3.0/scconfig/src/default/lib_uniqinc.c:226:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	long w1len = strlen(word1), w2len = strlen(word2), tlen;
data/pcb-rnd-2.3.0/scconfig/src/default/lib_uniqinc.c:226:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	long w1len = strlen(word1), w2len = strlen(word2), tlen;
data/pcb-rnd-2.3.0/scconfig/src/default/lib_uniqinc.c:242:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			tlen = strlen(s);
data/pcb-rnd-2.3.0/scconfig/src/default/lib_uniqinc.c:264:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tlen = strlen(includes);
data/pcb-rnd-2.3.0/scconfig/src/default/log.c:123:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (line[strlen(line)-1] != '\n')
data/pcb-rnd-2.3.0/scconfig/src/default/regex.c:596:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	end = bol + strlen(bol);
data/pcb-rnd-2.3.0/scconfig/src/default/regex.c:599:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		l2 = strlen(sub);
data/pcb-rnd-2.3.0/scconfig/src/default/str.c:36:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l   = strlen(str)+1;
data/pcb-rnd-2.3.0/scconfig/src/default/str.c:54:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	end = str + strlen(str) - 1;
data/pcb-rnd-2.3.0/scconfig/src/default/str.c:91:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	o = out = malloc(strlen(str)+1);
data/pcb-rnd-2.3.0/scconfig/src/default/str.c:129:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len[v] = strlen(str[v]);
data/pcb-rnd-2.3.0/scconfig/src/default/str.c:137:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sl = strlen(sep);
data/pcb-rnd-2.3.0/scconfig/src/generator/generator.c:89:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = cmd_buff + strlen(cmd_buff);
data/pcb-rnd-2.3.0/scconfig/src/generator/generator.c:454:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	slen = strlen(csub);
data/pcb-rnd-2.3.0/scconfig/src/generator/generator.c:456:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buff = malloc(strlen(val)*(slen+3)+32); /* big enough for worst case, when every letter and $ and ^ are replaced with sub */
data/pcb-rnd-2.3.0/scconfig/src/generator/generator.c:458:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buff = malloc(strlen(val)+slen+32);  /* only one replacement will be done */
data/pcb-rnd-2.3.0/scconfig/src/generator/generator.c:467:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		end = buff + strlen(buff);
data/pcb-rnd-2.3.0/scconfig/src/generator/generator.c:528:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	path = malloc(strlen(arr) + 32);
data/pcb-rnd-2.3.0/scconfig/src/generator/generator.c:530:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	idx = path + strlen(arr);
data/pcb-rnd-2.3.0/scconfig/src/generator/generator.c:537:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(val, s, len);
data/pcb-rnd-2.3.0/scconfig/src/generator/generator.c:737:13:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while((c = fgetc(TOP.in)) != EOF) {
data/pcb-rnd-2.3.0/scconfig/src/math/find_fpenan.c:245:76:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (target_emu_fail(out) || (test[1] == NULL) || (strncmp(out, test[1], strlen(test[1])) == 0)) {
data/pcb-rnd-2.3.0/scconfig/src/math/find_mfunc_cc.c:51:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(test_c_templ) + strlen(func) + strlen(values) + 1;
data/pcb-rnd-2.3.0/scconfig/src/math/find_mfunc_cc.c:51:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(test_c_templ) + strlen(func) + strlen(values) + 1;
data/pcb-rnd-2.3.0/scconfig/src/math/find_mfunc_cc.c:51:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(test_c_templ) + strlen(func) + strlen(values) + 1;
data/pcb-rnd-2.3.0/scconfig/src/math/find_mfunc_cc.c:73:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(fn_esc) + 32);
data/pcb-rnd-2.3.0/scconfig/src/menulib/hookreadline.c:32:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define hrl_puts(h, s)       h->write(h, s, strlen(s))
data/pcb-rnd-2.3.0/scconfig/src/menulib/hookreadline.c:82:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	h->used = strlen(nw);
data/pcb-rnd-2.3.0/scconfig/src/menulib/hookreadline.c:98:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		vt100_move(&(h->term), h->srow, h->scol - strlen(h->prompt));
data/pcb-rnd-2.3.0/scconfig/src/menulib/hookreadline.c:227:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				h->promptlen = strlen(h->prompt);
data/pcb-rnd-2.3.0/scconfig/src/menulib/hookreadline.c:320:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							h->alloced = h->used = strlen(h->line);
data/pcb-rnd-2.3.0/scconfig/src/menulib/hookreadline.c:476:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(current)+1;
data/pcb-rnd-2.3.0/scconfig/src/menulib/hookreadline.c:501:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	len = read(0, &c, 1);
data/pcb-rnd-2.3.0/scconfig/src/menulib/hookreadline.c:573:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	h->used = strlen(line);
data/pcb-rnd-2.3.0/scconfig/src/menulib/hookreadline.c:587:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(prompt)+1;
data/pcb-rnd-2.3.0/scconfig/src/menulib/hrl_test.c:12:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	newline = malloc(strlen(*line) + 16);
data/pcb-rnd-2.3.0/scconfig/src/menulib/hrl_test.c:19:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	(*cursor) += strlen(insert);
data/pcb-rnd-2.3.0/scconfig/src/menulib/scmenu.c:90:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(win->title);
data/pcb-rnd-2.3.0/scconfig/src/menulib/scmenu.c:96:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sl = strlen(suffix);
data/pcb-rnd-2.3.0/scconfig/src/menulib/scmenu.c:130:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tlen = strlen(win->title)+8;
data/pcb-rnd-2.3.0/scconfig/src/menulib/scmenu_menu.c:111:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			*klen = strlen(entry->key);
data/pcb-rnd-2.3.0/scconfig/src/menulib/scmenu_menu.c:119:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			*klen = strlen(entry->key);
data/pcb-rnd-2.3.0/scconfig/src/menulib/scmenu_menu.c:120:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			vlen = strlen(entry->value);
data/pcb-rnd-2.3.0/scconfig/src/menulib/scmenu_menu.c:131:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			*klen = strlen(entry->key);
data/pcb-rnd-2.3.0/scconfig/src/menulib/scmenu_menu.c:132:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			vlen = strlen(entry->value);
data/pcb-rnd-2.3.0/scconfig/src/menulib/scmenu_text.c:69:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		vt100_write(TERM, *r, strlen(*r));
data/pcb-rnd-2.3.0/scconfig/src/menulib/scmenu_text.c:190:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int l = strlen(text->row[r]);
data/pcb-rnd-2.3.0/scconfig/src/menulib/scmenu_text.c:209:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int tlen = strlen(text_), r;
data/pcb-rnd-2.3.0/scconfig/src/menulib/vt100.h:60:71:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define vt100_puts(state, s)        state->write(state->user_data, s, strlen(s))
data/pcb-rnd-2.3.0/scconfig/src/parsgen/find_parsgen.c:54:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(temp_in_esc) + 16);
data/pcb-rnd-2.3.0/scconfig/src/parsgen/find_parsgen.c:100:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bisfile = malloc(strlen(temp_in) + 32);
data/pcb-rnd-2.3.0/scconfig/src/parsgen/find_parsgen.c:110:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(temp_in_esc) + 16);
data/pcb-rnd-2.3.0/scconfig/src/parsgen/find_parsgen.c:148:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bisfile = malloc(strlen(temp_in) + 32);
data/pcb-rnd-2.3.0/scconfig/src/parsgen/find_parsgen.c:158:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(temp_in_esc)*2 + 32);
data/pcb-rnd-2.3.0/scconfig/src/parsgen/find_parsgen.c:208:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(temp_in_esc) + 32);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_ruby.c:36:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tmp = malloc(strlen(basedir) + strlen(files[n]) + 4);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_ruby.c:36:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tmp = malloc(strlen(basedir) + strlen(files[n]) + 4);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_ruby.c:41:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			tmp = malloc(strlen(basedir) + strlen(files[n]) + strlen(ifiles[m]) + 16);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_ruby.c:41:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			tmp = malloc(strlen(basedir) + strlen(files[n]) + strlen(ifiles[m]) + 16);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_ruby.c:41:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			tmp = malloc(strlen(basedir) + strlen(files[n]) + strlen(ifiles[m]) + 16);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_ruby.c:46:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				ldflags = malloc(strlen(files[n]) + 16);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_tcl.c:114:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(temp) + 16);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_tcl.c:120:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			cmd = malloc(strlen(out) + 256);
data/pcb-rnd-2.3.0/scconfig/src/scripts/find_tcl.c:124:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			out = malloc(strlen(temp2) + 32);
data/pcb-rnd-2.3.0/scconfig/src/scripts/scripts.c:61:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	llen = strlen(language);
data/pcb-rnd-2.3.0/scconfig/src/scripts/scripts.c:71:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				ldflags = malloc(strlen(files[n]) + strlen(ldflags_base) + 16);
data/pcb-rnd-2.3.0/scconfig/src/scripts/scripts.c:71:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				ldflags = malloc(strlen(files[n]) + strlen(ldflags_base) + 16);
data/pcb-rnd-2.3.0/scconfig/src/scripts/scripts.c:73:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				cflags = malloc(strlen(files[n]) + strlen(basedir) + 16);
data/pcb-rnd-2.3.0/scconfig/src/scripts/scripts.c:73:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				cflags = malloc(strlen(files[n]) + strlen(basedir) + 16);
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:183:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_c = malloc(strlen(test_c_socketpair)+32);
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:239:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	test_c = malloc(strlen(test_c_socket)+32);
data/pcb-rnd-2.3.0/scconfig/src/socket/find_socket.c:856:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	nodeend = node + strlen(node);
data/pcb-rnd-2.3.0/scconfig/src/socket/socket.c:71:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ilen = strlen(includes);
data/pcb-rnd-2.3.0/scconfig/src/socket/socket.c:72:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	slen = strlen(test_c);
data/pcb-rnd-2.3.0/scconfig/src/socket/socket.c:110:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			ilen = strlen(includes);
data/pcb-rnd-2.3.0/scconfig/src/socket/socket.c:112:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			tmp = malloc(strlen(prefix) + 32);
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm.c:21:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l   = strlen(str)+1;
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm.c:702:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			l = strlen(i);
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:296:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	slen = strlen(csub);
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:298:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buff = malloc(strlen(val)*(slen+3)+32); /* big enough for worst case, when every letter and $ and ^ are replaced with sub */
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:300:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buff = malloc(strlen(val)+slen+32);  /* only one replacement will be done */
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:308:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		end = buff + strlen(buff);
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:318:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buff = realloc(buff, strlen(buff)+1);
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:451:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c = fgetc(fin);
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:517:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		char *err = malloc(strlen(fn) + strlen(path) + strlen(mode) + 16);
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:517:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		char *err = malloc(strlen(fn) + strlen(path) + strlen(mode) + 16);
data/pcb-rnd-2.3.0/scconfig/src/tmpasm/tmpasm_scconfig.c:517:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		char *err = malloc(strlen(fn) + strlen(path) + strlen(mode) + 16);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/libfawk_sc_fawk.c:318:9:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int (*getchar)(fawk_ctx_t *ctx, fawk_src_t *src);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/libfawk_sc_fawk.c:996:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (argc > fc->data.func.numargs) {FAWK_ERROR(ctx, 64 + strlen(fc->data.func.name), (FAWK_ERR, "Function '%s' called with more arguments than it takes\n", fc->data.func.name)); return; }
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/libfawk_sc_fawk.c:1451:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 size_t l = strlen(s);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/libfawk_sc_fawk.c:1487:21:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ret = ctx->parser.getchar(ctx, ctx->parser.isp);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/libfawk_sc_fawk.c:1631:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 size_t slen = strlen(s), len = (len_limit == -1) ? slen : ((slen < len_limit) ? slen : len_limit);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/libfawk_sc_fawk.c:1714:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    FAWK_ERROR(ctx, 64+strlen(name), (FAWK_ERR, "funcreg: '%s' collides with another global symbol\n", name));
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/tmpfawk.c:32:9:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return fgetc(f);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/tmpfawk.c:40:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int l1 = strlen(src->fn), l2 = strlen(from->fn);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/tmpfawk.c:40:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int l1 = strlen(src->fn), l2 = strlen(from->fn);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/tmpfawk.c:241:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	slen = strlen(csub);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/tmpfawk.c:243:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buff = malloc(strlen(val)*(slen+3)+32); /* big enough for worst case, when every letter and $ and ^ are replaced with sub */
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/tmpfawk.c:245:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buff = malloc(strlen(val)+slen+32);  /* only one replacement will be done */
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/tmpfawk.c:253:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		end = buff + strlen(buff);
data/pcb-rnd-2.3.0/scconfig/src/tmpfawk/tmpfawk.c:263:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buff = realloc(buff, strlen(buff)+1);
data/pcb-rnd-2.3.0/scconfig/src/tty/find_ioctl.c:56:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	nodeend = node + strlen(node);
data/pcb-rnd-2.3.0/scconfig/src/util/arg_auto_set.c:83:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pl = strlen(padding);
data/pcb-rnd-2.3.0/scconfig/src/util/arg_auto_set.c:89:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int kl = strlen(t->arg_key);
data/pcb-rnd-2.3.0/scconfig/src/util/cquote.c:33:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while((c = getc(stdin)) != EOF) {
data/pcb-rnd-2.3.0/scconfig/src/util/cquote.c:79:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while((c = getc(stdin)) != EOF) {
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:293:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const char *s = path + strlen(path);
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:304:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t dlen = strlen(dir), blen = strlen(bn);
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:304:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t dlen = strlen(dir), blen = strlen(bn);
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:449:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		end = pwd_buff + strlen(pwd_buff) - 1;
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:503:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(p);
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:530:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		pwdlen = strlen(pwd);
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:531:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		srclen = strlen(src);
data/pcb-rnd-2.3.0/scconfig/src/util/sccbox.c:599:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int res = 1, len = strlen(path);
data/pcb-rnd-2.3.0/src/attrib.c:78:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int i, glb = -1, plugin_len = strlen(plugin);
data/pcb-rnd-2.3.0/src/board.c:133:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			fwrite(default_pcb_internal, strlen(default_pcb_internal), 1, f);
data/pcb-rnd-2.3.0/src/brave.c:103:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			next = curr + strlen(curr);
data/pcb-rnd-2.3.0/src/change.c:1012:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(key); /* +1 for the terminator is implied by sizeof(->str) */
data/pcb-rnd-2.3.0/src/draw.c:809:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(info->noexport_name+9, info->export_name, sizeof(info->noexport_name)-10);
data/pcb-rnd-2.3.0/src/draw_label_smart.c:49:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(label);
data/pcb-rnd-2.3.0/src/flag_str.c:225:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			char *msg = alloc_buf(strlen(fmt) + strlen(orig_bp));
data/pcb-rnd-2.3.0/src/flag_str.c:225:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			char *msg = alloc_buf(strlen(fmt) + strlen(orig_bp));
data/pcb-rnd-2.3.0/src/flag_str.c:306:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			bp += strlen(bp);
data/pcb-rnd-2.3.0/src/flag_str.c:397:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				msg = alloc_buf(strlen(fmt) + flen);
data/pcb-rnd-2.3.0/src/flag_str.c:476:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len += strlen(u->str) + 1;
data/pcb-rnd-2.3.0/src/flag_str.c:498:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		bp += strlen("thermal");
data/pcb-rnd-2.3.0/src/flag_str.c:504:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		bp += strlen(bp);
data/pcb-rnd-2.3.0/src/flag_str.c:521:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(u->str);
data/pcb-rnd-2.3.0/src/hid_cam.c:166:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf = (char *) malloc(strlen(pf) + strlen(suffix) + 1);
data/pcb-rnd-2.3.0/src/hid_cam.c:166:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf = (char *) malloc(strlen(pf) + strlen(suffix) + 1);
data/pcb-rnd-2.3.0/src/hid_cam.c:171:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		bl = strlen(buf);
data/pcb-rnd-2.3.0/src/hid_cam.c:174:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				int slen = strlen(i->default_extension);
data/pcb-rnd-2.3.0/src/hid_cam.c:474:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(varname, *input, len);
data/pcb-rnd-2.3.0/src/idpath.c:176:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		dst->used += strlen(dst->array+end);
data/pcb-rnd-2.3.0/src/main.c:133:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if ((tmps = (char *) malloc((strlen(argv0) + strlen(p) + 2) * sizeof(char))) == NULL) {
data/pcb-rnd-2.3.0/src/main.c:133:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if ((tmps = (char *) malloc((strlen(argv0) + strlen(p) + 2) * sizeof(char))) == NULL) {
data/pcb-rnd-2.3.0/src/main.c:171:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l = strlen(bindir) + 1 + strlen(BINDIR_TO_EXECPREFIX) + 1;
data/pcb-rnd-2.3.0/src/main.c:171:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l = strlen(bindir) + 1 + strlen(BINDIR_TO_EXECPREFIX) + 1;
data/pcb-rnd-2.3.0/src/netlist.c:214:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(pinname)+1;
data/pcb-rnd-2.3.0/src/netlist.c:348:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	a = pcb_undo_alloc(pcb, &undo_net_alloc, sizeof(undo_net_alloc_t) + strlen(netname));
data/pcb-rnd-2.3.0/src/netlist.c:641:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(pinname)+1;
data/pcb-rnd-2.3.0/src/netlist_act.c:76:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				le = strlen(subc->refdes);
data/pcb-rnd-2.3.0/src/netlist_act.c:77:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				lp = strlen(o->term);
data/pcb-rnd-2.3.0/src/obj_subc.c:2399:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		long len = strlen(txt->TextString);
data/pcb-rnd-2.3.0/src/obj_term.c:256:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		nname_len = strlen(new_name);
data/pcb-rnd-2.3.0/src/obj_term.c:259:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		oname_len = strlen(obj->term);
data/pcb-rnd-2.3.0/src/obj_text.c:328:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(key, *input, len);
data/pcb-rnd-2.3.0/src/plug_footprint.c:96:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	s = *params + strlen(*params) - 1;
data/pcb-rnd-2.3.0/src/plug_footprint.c:224:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int nl = strlen(name);
data/pcb-rnd-2.3.0/src/plug_footprint.c:453:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(toppath_, p, sizeof(toppath_) - 1);
data/pcb-rnd-2.3.0/src/plug_io.c:180:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if((fgetc(ft) != EOF)) {
data/pcb-rnd-2.3.0/src/plug_io.c:367:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int fn_len = strlen(PCB->hidlib.filename);
data/pcb-rnd-2.3.0/src/plug_io.c:375:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					int elen = strlen(n->default_extension);
data/pcb-rnd-2.3.0/src/plug_io.c:984:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(Filename);
data/pcb-rnd-2.3.0/src/rats_patch.c:602:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(PCB->hidlib.filename);
data/pcb-rnd-2.3.0/src/route_style.c:91:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(Name);
data/pcb-rnd-2.3.0/src/route_style.c:352:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(g->rst.name, new_name, sizeof(g->rst.name));
data/pcb-rnd-2.3.0/src/route_style.c:371:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(g->rst.name, name, sizeof(g->rst.name));
data/pcb-rnd-2.3.0/src/view.c:348:13:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while((c = fgetc(f)) != EOF) {
data/pcb-rnd-2.3.0/src_3rd/genht/ver_edit.c:8:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		next = s + strlen(pattern); \
data/pcb-rnd-2.3.0/src_3rd/genht/ver_edit.c:10:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		s += strlen(value); \
data/pcb-rnd-2.3.0/src_3rd/genht/ver_edit.c:11:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		memmove(s, next, strlen(next)+1); \
data/pcb-rnd-2.3.0/src_3rd/genregex/tester.c:15:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	end = s + strlen(s) - 1;
data/pcb-rnd-2.3.0/src_3rd/genregex/tester_main.c:40:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	subslen = strlen(subs);
data/pcb-rnd-2.3.0/src_3rd/genregex/tester_main.c:46:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		linelen=strlen(line);
data/pcb-rnd-2.3.0/src_3rd/gensexpr/gensexpr_impl.c:52:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(s)+1;
data/pcb-rnd-2.3.0/src_3rd/genvector/gds_char.h:28:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define GVT_STRLEN(s) strlen(s)
data/pcb-rnd-2.3.0/src_3rd/genvector/gds_char.h:58:80:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define gds_insert_str(vect, from, str)  gds_insert_len((vect), (from), (str), strlen(str))
data/pcb-rnd-2.3.0/src_3rd/genvector/gds_char.h:60:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define gds_prepend_str(vect, str) gds_insert_len((vect), 0, (str), strlen(str))
data/pcb-rnd-2.3.0/src_3rd/genvector/gds_wchar.h:32:24:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#	define GVT_STRLEN(s) wcslen(s)
data/pcb-rnd-2.3.0/src_3rd/genvector/gds_wchar.h:65:82:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define wgds_insert_str(vect, from, str)  wgds_insert_len((vect), (from), (str), wcslen(str))
data/pcb-rnd-2.3.0/src_3rd/genvector/gds_wchar.h:67:71:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define wgds_prepend_str(vect, str) wgds_insert_len((vect), 0, (str), wcslen(str))
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw.c:33:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(s);
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw.c:74:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int ll, nl = strlen(name);
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw.c:189:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int nl = strlen(obj_name);
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw.c:327:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len, maxlen = strlen(filename);
data/pcb-rnd-2.3.0/src_3rd/libfungw/fungw.c:330:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(*endings);
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/fungw_fawk.c:47:9:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return fgetc(f);
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/fungw_fawk.c:55:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int l1 = strlen(src->fn), l2 = strlen(from->fn);
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/fungw_fawk.c:55:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int l1 = strlen(src->fn), l2 = strlen(from->fn);
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:1021:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (argc > fc->data.func.numargs) {FAWK_ERROR(ctx, 64 + strlen(fc->data.func.name), (FAWK_ERR, "Function '%s' called with more arguments than it takes\n", fc->data.func.name)); return; }
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:1478:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 size_t l = strlen(s);
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:1662:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 size_t slen = strlen(s), len = (len_limit == -1) ? slen : ((slen < len_limit) ? slen : len_limit);
data/pcb-rnd-2.3.0/src_3rd/libfungwbind/fawk/libfawk_sc/libfawk_sc_all.c:1737:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    FAWK_ERROR(ctx, 64+strlen(name), (FAWK_ERR, "funcreg: '%s' collides with another global symbol\n", name));
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/lhtpers.c:589:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				end = sp->text_data + strlen(sp->text_data) - 1;
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/lhtpers.c:651:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c = fgetc(inf);
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/lhtpers.c:810:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					*errmsg = malloc(strlen(msg) + strlen(infn) + 128);
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/lhtpers.c:810:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					*errmsg = malloc(strlen(msg) + strlen(infn) + 128);
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/lhtpers.c:824:14:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		while((c = fgetc(inf)) != EOF)
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/output.c:56:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			l1 = strlen(ind);
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/output.c:69:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			l1 = strlen(ind);
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/output.c:134:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(name_pre);
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/output.c:242:11:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
					goto mismatch;
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/output.c:246:10:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
				goto mismatch;
data/pcb-rnd-2.3.0/src_3rd/liblhtpers/output.c:248:3:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
		mismatch:;
data/pcb-rnd-2.3.0/src_3rd/liblihata/dom.c:378:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ind->prefix_len = strlen(prefix);
data/pcb-rnd-2.3.0/src_3rd/liblihata/dom.c:508:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(node->name) > 0)
data/pcb-rnd-2.3.0/src_3rd/liblihata/dom.c:558:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					if (strlen(node->data.table.row_names[row]) > 0) {
data/pcb-rnd-2.3.0/src_3rd/liblihata/dom.c:738:11:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		int c = fgetc(f);
data/pcb-rnd-2.3.0/src_3rd/liblihata/dom.c:749:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					*errmsg = malloc(strlen(msg) + strlen(fn) + 128);
data/pcb-rnd-2.3.0/src_3rd/liblihata/dom.c:749:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					*errmsg = malloc(strlen(msg) + strlen(fn) + 128);
data/pcb-rnd-2.3.0/src_3rd/liblihata/dom.c:777:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			*errmsg = malloc(strlen(fn) + 128);
data/pcb-rnd-2.3.0/src_3rd/liblihata/dom.c:810:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					*errmsg = malloc(strlen(msg) + strlen(fn) + 128);
data/pcb-rnd-2.3.0/src_3rd/liblihata/dom.c:810:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					*errmsg = malloc(strlen(msg) + strlen(fn) + 128);
data/pcb-rnd-2.3.0/src_3rd/liblihata/lihata.c:149:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(s);
data/pcb-rnd-2.3.0/src_3rd/liblihata/test_dom.c:18:11:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		int c = getchar();
data/pcb-rnd-2.3.0/src_3rd/liblihata/test_parser.c:58:11:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		int c = getchar();
data/pcb-rnd-2.3.0/src_3rd/liblihata/test_tree.c:52:11:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		int c = fgetc(f);
data/pcb-rnd-2.3.0/src_3rd/liblihata/test_tree.c:965:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				end = l + strlen(l) - 1;
data/pcb-rnd-2.3.0/src_3rd/liblihata/tree.c:186:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l1 = strlen(dst->data.text.value);
data/pcb-rnd-2.3.0/src_3rd/liblihata/tree.c:187:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l2 = strlen(src->data.text.value);
data/pcb-rnd-2.3.0/src_3rd/liblihata/tree_path.c:257:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len += strlen(tmp->name) + 1; /* this last is for '/' */
data/pcb-rnd-2.3.0/src_3rd/liblihata/tree_path.c:261:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len += strlen(buff) + 1;
data/pcb-rnd-2.3.0/src_3rd/liblihata/tree_path.c:266:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len += strlen(buff) + 1;
data/pcb-rnd-2.3.0/src_3rd/liblihata/tree_path.c:289:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = strlen(tmp->name);
data/pcb-rnd-2.3.0/src_3rd/liblihata/tree_path.c:295:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = strlen(buff);
data/pcb-rnd-2.3.0/src_3rd/liblihata/tree_path.c:302:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = strlen(buff);
data/pcb-rnd-2.3.0/src_3rd/libporty_net/libportytcp4.c:139:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return read(s, buf, count);
data/pcb-rnd-2.3.0/src_3rd/libporty_net/libportytcp4.c:360:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(USLEEP_MAX);
data/pcb-rnd-2.3.0/src_3rd/libporty_net/libportytcp4.c:363:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(usecs);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/actions.c:98:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(a[i].name);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/actions.c:424:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str = (char *) malloc(strlen(rstr) + 1);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/actions.c:579:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	blen = strlen(base);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/actions.c:580:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	slen = strlen(suffix);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/actions.h:159:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return rnd_make_action_name(out, inp, strlen(inp));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_fs.c:194:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	mytmpdir = (char *) malloc(sizeof(char) * (strlen(tmpdir) + 1 + strlen(TEMPLATE) + 1));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_fs.c:194:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	mytmpdir = (char *) malloc(sizeof(char) * (strlen(tmpdir) + 1 + strlen(TEMPLATE) + 1));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_fs.c:211:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(mytmpdir) +  /* the temp directory name */
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_fs.c:213:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strlen(name) +          /* the file name */
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_fs.c:255:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	e = strlen(name) - 1;
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_misc.c:70:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(gecos);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_misc.c:91:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int a, l = strlen(s);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_misc.c:103:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int l = strlen(s);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/compat_misc.c:206:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(ms*1000);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:281:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	dlen = strlen(dir);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:403:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	long len = strlen(root->name), p = -1;
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:466:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(res, project_fn, sizeof(res)-1);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:474:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(res, pcb_fn, sizeof(res)-1);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:497:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(res, efn, sizeof(res)-1);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:524:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (rnd_strncasecmp(*s, text, strlen(*s)) == 0) {
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:529:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (rnd_strncasecmp(*s, text, strlen(*s)) == 0) {
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:900:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int nl, ppl = strlen(path_prefix), res = 0;
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:912:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		nl = strlen(n->name);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:1384:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(prefix);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:1688:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int pl = strlen(prefix), al = strlen(arg_);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:1688:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int pl = strlen(prefix), al = strlen(arg_);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:1776:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int pl = (prefix == NULL ? 0 : strlen(prefix));
data/pcb-rnd-2.3.0/src_3rd/librnd/core/conf.c:1782:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				int kl = strlen(n->hash_path);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/funchash.c:127:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	kl = strlen(key);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_cfg.c:70:11:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		int c = fgetc(f);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_cfg_input.c:281:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(tmp, desc, len);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_cfg_input.c:318:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(curr);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_cfg_input.c:787:29:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
		if (mods & RND_M_Alt)   { strncpy(end, "Alt-", dst_len); end += 4; ll += 4; }
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_cfg_input.c:788:29:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
		if (mods & RND_M_Ctrl)  { strncpy(end, "Ctrl-", dst_len); end += 5; ll += 5; }
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_cfg_input.c:789:29:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
		if (mods & RND_M_Shift) { strncpy(end, "Shift-", dst_len); end += 6; ll += 6; }
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_cfg_input.c:795:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			l = strlen(end);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_cfg_input.c:798:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
			strncpy(end, "<unknown>", dst_len);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_dlg.c:50:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(tmp+4, act_name, sizeof(tmp)-5);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_init.c:499:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for(s = dir + strlen(dir) - 1; s >= dir; s--) {
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_menu.c:545:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	init_len = path.used - strlen(a->name) - 1;
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_menu.c:817:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int fn_len = strlen(fn);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_menu.c:822:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strcpy((*p)+strlen(*p), fn);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_menu.c:891:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int level = 0, len = strlen(menu_path), iafter = 0;
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_menu.c:916:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			end = next_seg + strlen(next_seg);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/hid_nogui.c:243:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (i = strlen(s) - 1; i >= 0; i--)
data/pcb-rnd-2.3.0/src_3rd/librnd/core/misc_util.c:166:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (strncmp(units, extra_units[i].suffix, strlen(extra_units[i].suffix)) == 0) {
data/pcb-rnd-2.3.0/src_3rd/librnd/core/misc_util.c:237:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen(p1);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/misc_util.c:243:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(copy, p1, length);
data/pcb-rnd-2.3.0/src_3rd/librnd/core/misc_util.c:273:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	end = s + strlen(s) - 1;
data/pcb-rnd-2.3.0/src_3rd/librnd/core/rnd_printf.c:76:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *end = str + strlen(str) - 1;
data/pcb-rnd-2.3.0/src_3rd/librnd/core/safe_fs.c:366:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			pl = strlen(real_p);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/dlg_attr_misc.c:499:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(buf);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/main.c:1356:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(out, name, out_len);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/main.c:1678:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if ((nbytes = read(*fid, buf, BUFSIZ)) == -1)
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/main.c:1760:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			tmpopt = (char *) malloc(strlen(a->name) + 3);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/main.c:1765:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			tmpres = (char *) malloc(strlen(a->name) + 2);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/xm_tree_table_priv.c:74:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int slen = str ? strlen(str) : 0;
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/xm_tree_table_priv.c:93:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		slen = strlen(str);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/xm_tree_table_priv.c:154:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			XTextExtents(tt->font, str, strlen(str), i_ret, i_ret + 1, i_ret + 2, &chrs);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/xm_tree_table_priv.c:378:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int name_len = TTBL_MIN(120, strlen(widget_name));
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/xm_tree_table_priv.c:488:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int slen = strlen(str);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_lesstif/xm_tree_table_priv.c:512:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				int slen = strlen(str);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_remote/proto.c:292:11:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		int c = getchar();
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_remote/proto_lowsend.h:136:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return send_raw(ctx, s, strlen(s));
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/hid_remote/remote.c:172:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int max = strlen(cap_style_names);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/dlg_attr_txt.c:176:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		txt_set_text_(b, how, str, strlen(str));
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/glue_hid.c:373:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		*len = strlen(txt) + 1;
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_gtk_common/in_keyboard.c:171:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(out, name, out_len);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/act_dad.c:192:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(txt);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/cli_history.c:55:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(s);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/menu_helper.c:79:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(cp);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/place.c:170:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	end = path + strlen(BASEPATH);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/place.c:180:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(nd->name);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/place.c:189:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy(end2, "x"); place_conf_load(role, path, &x);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/place.c:190:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy(end2, "y"); place_conf_load(role, path, &y);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/place.c:212:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	end = path + strlen(BASEPATH);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/place.c:214:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(e->key);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/place.c:221:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy(end2, "x"); place_conf_set(role, path, e->value.x);
data/pcb-rnd-2.3.0/src_3rd/librnd/plugins/lib_hid_common/place.c:222:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy(end2, "y"); place_conf_set(role, path, e->value.y);
data/pcb-rnd-2.3.0/src_3rd/libuhpgl/parse.c:102:13:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while((c = fgetc(f)) != EOF) {
data/pcb-rnd-2.3.0/src_3rd/libuirc/libuirc.c:253:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(ctx->nick);
data/pcb-rnd-2.3.0/src_3rd/libuirc/main.c:82:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(100);
data/pcb-rnd-2.3.0/src_3rd/puplug/error.c:150:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tmp = malloc(strlen(msg) + strlen(from) + strlen(det) + 32);
data/pcb-rnd-2.3.0/src_3rd/puplug/error.c:150:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tmp = malloc(strlen(msg) + strlen(from) + strlen(det) + 32);
data/pcb-rnd-2.3.0/src_3rd/puplug/error.c:150:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tmp = malloc(strlen(msg) + strlen(from) + strlen(det) + 32);
data/pcb-rnd-2.3.0/src_3rd/puplug/libs.c:135:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	end += strlen(func);
data/pcb-rnd-2.3.0/src_3rd/puplug/libs.c:394:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(dirname) >= PUP_PATH_MAX)
data/pcb-rnd-2.3.0/src_3rd/puplug/libs_dep.c:49:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tmp = malloc(strlen(who) + strlen(with_whom) + 40);
data/pcb-rnd-2.3.0/src_3rd/puplug/libs_dep.c:49:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tmp = malloc(strlen(who) + strlen(with_whom) + 40);
data/pcb-rnd-2.3.0/src_3rd/puplug/libs_dep.c:171:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c = fgetc(f);
data/pcb-rnd-2.3.0/src_3rd/puplug/os_dep.c:116:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(s);
data/pcb-rnd-2.3.0/src_3rd/puplug/os_dep_fs.c:81:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	s = malloc(strlen(dirname)+10);
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:84:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(s);
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:202:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c = fgetc(f);
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:296:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		fn = pn + strlen(pn) + 1;
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:298:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			next = fn + strlen(fn) + 1;
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:401:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	subend = sub + strlen(sub);
data/pcb-rnd-2.3.0/src_3rd/puplug/util/puplug.c:476:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	findpups(root, strlen(root), 1, found_fmt, dep_fmt, conflict_fmt);
data/pcb-rnd-2.3.0/src_3rd/qparse/example_dynamic.c:17:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		for(end = s + strlen(s) - 1; (end >= s) && ((*end == '\r') || (*end == '\n')); end--)
data/pcb-rnd-2.3.0/src_3rd/qparse/example_static.c:28:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		for(end = s + strlen(s) - 1; (end >= s) && ((*end == '\r') || (*end == '\n')); end--)
data/pcb-rnd-2.3.0/src_3rd/qparse/qparse.c:309:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int l = strlen(s);
data/pcb-rnd-2.3.0/src_3rd/sphash/sphash.c:87:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(s)+1;
data/pcb-rnd-2.3.0/src_3rd/sphash/sphash.c:145:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			s[strlen(s)-1] = '\0';
data/pcb-rnd-2.3.0/src_3rd/sphash/sphash.c:293:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int l = strlen(file_name_);
data/pcb-rnd-2.3.0/src_3rd/sphash/test.c:11:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		s[strlen(s)-1] = '\0';
data/pcb-rnd-2.3.0/src_plugins/ar_cpcb/ar_cpcb.c:126:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c = fgetc(f);
data/pcb-rnd-2.3.0/src_plugins/cam/cam_gui.c:106:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(tmp, c->op.write.arg, sizeof(tmp));
data/pcb-rnd-2.3.0/src_plugins/ddraft/cli.c:188:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					next = s+strlen(s);
data/pcb-rnd-2.3.0/src_plugins/ddraft/cli.c:265:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	memmove(str+from, str+to, strlen(str+to)+1);
data/pcb-rnd-2.3.0/src_plugins/ddraft/cli.c:271:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int inslen = strlen(ins), remain = strlen(str+from), extra = 0;
data/pcb-rnd-2.3.0/src_plugins/ddraft/cli.c:271:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int inslen = strlen(ins), remain = strlen(str+from), extra = 0;
data/pcb-rnd-2.3.0/src_plugins/ddraft/cli.c:534:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(cline);
data/pcb-rnd-2.3.0/src_plugins/ddraft/cli_line.c:122:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			cursor = cli_str_insert(line, strlen(line), buff, 1);
data/pcb-rnd-2.3.0/src_plugins/ddraft/constraint_gui.c:104:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buff, inp, sizeof(buff)); \
data/pcb-rnd-2.3.0/src_plugins/diag/diag_conf.c:36:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		pl = strlen(match_prefix);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_library.c:593:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	namelen = strlen(name);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_library_param.c:71:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			vlen = strlen(val);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_library_param.c:77:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					len = strlen(*s);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_library_param.c:201:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		end = line + strlen(line) - 1;
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_library_param.c:271:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (strlen(arg) > 32) {
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_library_param.c:423:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		end = parain + strlen(parain) - 1;
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_library_param.c:489:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(l->name);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_loadsave.c:148:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (s = fn + strlen(fn) - 1; *s != '.'; s--) {
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_loadsave.c:204:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(save->last_ext, ext, sizeof(save->last_ext));
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_loadsave.c:554:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(save.last_ext, end, sizeof(save.last_ext));
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_padstack.c:479:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		end += strlen(pcb_proto_layers[from].name);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_color.c:116:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			pl = strlen(path_prefix);
data/pcb-rnd-2.3.0/src_plugins/dialogs/dlg_pref_conf.c:74:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(e->key) > sizeof(path) - 1) {
data/pcb-rnd-2.3.0/src_plugins/djopt/djopt.c:152:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bp = buf[bn] + strlen(buf[bn]);
data/pcb-rnd-2.3.0/src_plugins/djopt/djopt.c:165:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sprintf(bp + strlen(bp), " n%d l%d]\033[0m", c->n_lines, c->layer);
data/pcb-rnd-2.3.0/src_plugins/drc_query/drc_query.c:299:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strncmp(cfg->hash_path, DRC_CONF_PATH_RULES, strlen(DRC_CONF_PATH_RULES)-1) == 0) {
data/pcb-rnd-2.3.0/src_plugins/drc_query/drc_query.c:306:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strncmp(cfg->hash_path, DRC_CONF_PATH_DEFS, strlen(DRC_CONF_PATH_DEFS)-1) != 0)
data/pcb-rnd-2.3.0/src_plugins/export_bom/bom.c:79:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((out = malloc((strlen(in) + 1) * sizeof(char))) == NULL) {
data/pcb-rnd-2.3.0/src_plugins/export_bom/bom.c:86:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (i = 0; i <= strlen(in); i++) {
data/pcb-rnd-2.3.0/src_plugins/export_excellon/excellon.c:241:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	i = strlen(fnbase);
data/pcb-rnd-2.3.0/src_plugins/export_excellon/excellon.c:244:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	filesuff = filename + strlen(filename);
data/pcb-rnd-2.3.0/src_plugins/export_gerber/gerber.c:360:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	i = strlen(fnbase);
data/pcb-rnd-2.3.0/src_plugins/export_openems/export_openems.c:698:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(filename);
data/pcb-rnd-2.3.0/src_plugins/export_openems/mesh.c:308:13:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while((c = fgetc(f)) != EOF) {
data/pcb-rnd-2.3.0/src_plugins/export_ps/ps.c:505:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf = (char *) malloc(strlen(base) + strlen(which) + 5);
data/pcb-rnd-2.3.0/src_plugins/export_ps/ps.c:505:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf = (char *) malloc(strlen(base) + strlen(which) + 5);
data/pcb-rnd-2.3.0/src_plugins/export_vfs_fuse/export_vfs_fuse.c:58:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pl = strlen(path);
data/pcb-rnd-2.3.0/src_plugins/export_vfs_fuse/export_vfs_fuse.c:95:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ctx.pathlen = strlen(path);
data/pcb-rnd-2.3.0/src_plugins/export_vfs_mc/export_vfs_mc.c:81:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while((len = read(0, buf, 256)) > 0) {
data/pcb-rnd-2.3.0/src_plugins/export_xy/xy.c:760:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int nl = strlen(i->name);
data/pcb-rnd-2.3.0/src_plugins/fp_board/fp_board.c:30:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strncmp(path, REQUIRE_PATH_PREFIX, strlen(REQUIRE_PATH_PREFIX)) != 0)
data/pcb-rnd-2.3.0/src_plugins/fp_board/fp_board.c:33:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fpath = path + strlen(REQUIRE_PATH_PREFIX);
data/pcb-rnd-2.3.0/src_plugins/fp_board/fp_board.c:91:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strncmp(name, REQUIRE_PATH_PREFIX, strlen(REQUIRE_PATH_PREFIX)) != 0)
data/pcb-rnd-2.3.0/src_plugins/fp_board/fp_board.c:95:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fpath = rnd_strdup(name + strlen(REQUIRE_PATH_PREFIX));
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:154:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int sl = strlen(subdir);
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:155:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int nl = strlen(name);
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:196:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		long slen = strlen(p);
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:241:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l = strlen(new_subdir);
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:266:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		l = strlen(subdirentry->d_name);
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:422:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ctx.target_len = strlen(ctx.target);
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:490:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				cmd = malloc(strlen(rnd_w32_bindir) + strlen(libshell) + strlen(fullname) + strlen(params) + 32);
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:490:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				cmd = malloc(strlen(rnd_w32_bindir) + strlen(libshell) + strlen(fullname) + strlen(params) + 32);
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:490:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				cmd = malloc(strlen(rnd_w32_bindir) + strlen(libshell) + strlen(fullname) + strlen(params) + 32);
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:490:81:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				cmd = malloc(strlen(rnd_w32_bindir) + strlen(libshell) + strlen(fullname) + strlen(params) + 32);
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:497:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			cmd = malloc(strlen(libshell) + strlen(fullname) + strlen(params) + 16);
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:497:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			cmd = malloc(strlen(libshell) + strlen(fullname) + strlen(params) + 16);
data/pcb-rnd-2.3.0/src_plugins/fp_fs/fp_fs.c:497:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			cmd = malloc(strlen(libshell) + strlen(fullname) + strlen(params) + 16);
data/pcb-rnd-2.3.0/src_plugins/fp_wget/edakrill.c:146:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strncmp(path, REQUIRE_PATH_PREFIX, strlen(REQUIRE_PATH_PREFIX)) != 0)
data/pcb-rnd-2.3.0/src_plugins/fp_wget/edakrill.c:201:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		end = line + strlen(line) - 1;
data/pcb-rnd-2.3.0/src_plugins/fp_wget/edakrill.c:263:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(line);
data/pcb-rnd-2.3.0/src_plugins/fp_wget/edakrill.c:295:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strncmp(name, REQUIRE_PATH_PREFIX, strlen(REQUIRE_PATH_PREFIX)) == 0)
data/pcb-rnd-2.3.0/src_plugins/fp_wget/edakrill.c:296:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			name+=strlen(REQUIRE_PATH_PREFIX);
data/pcb-rnd-2.3.0/src_plugins/fp_wget/gedasymbols.c:67:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strncmp(path, REQUIRE_PATH_PREFIX, strlen(REQUIRE_PATH_PREFIX)) != 0)
data/pcb-rnd-2.3.0/src_plugins/fp_wget/gedasymbols.c:171:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((strstr(line, fn) != NULL) && (strlen(line) < out_len)) {
data/pcb-rnd-2.3.0/src_plugins/fp_wget/gedasymbols.c:188:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strncmp(name, REQUIRE_PATH_PREFIX, strlen(REQUIRE_PATH_PREFIX)) == 0)
data/pcb-rnd-2.3.0/src_plugins/fp_wget/gedasymbols.c:189:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			name+=strlen(REQUIRE_PATH_PREFIX);
data/pcb-rnd-2.3.0/src_plugins/fp_wget/wget_common.c:60:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int ul = strlen(url), cl = strlen(cache_path);
data/pcb-rnd-2.3.0/src_plugins/fp_wget/wget_common.c:60:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int ul = strlen(url), cl = strlen(cache_path);
data/pcb-rnd-2.3.0/src_plugins/import_accel_net/accel_net.c:77:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c = fgetc(fn);
data/pcb-rnd-2.3.0/src_plugins/import_calay/calay.c:62:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		for(end = s + strlen(s) - 1; (end >= s) && ((*end == '\r') || (*end == '\n') || (*end == ' ')); end--) \
data/pcb-rnd-2.3.0/src_plugins/import_calay/calay.c:141:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(line);
data/pcb-rnd-2.3.0/src_plugins/import_calay/calay.c:222:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fname_cmp = malloc(strlen(fname_net) + strlen(CMPEXT) + 4);
data/pcb-rnd-2.3.0/src_plugins/import_calay/calay.c:222:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	fname_cmp = malloc(strlen(fname_net) + strlen(CMPEXT) + 4);
data/pcb-rnd-2.3.0/src_plugins/import_calay/calay.c:226:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		end = fname_cmp + strlen(fname_cmp);
data/pcb-rnd-2.3.0/src_plugins/import_dsn/dsn.c:244:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c = fgetc(f);
data/pcb-rnd-2.3.0/src_plugins/import_dsn/dsn.c:250:9:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				c = fgetc(f);
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:121:19:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define	Getc(s)			getc(s)
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:220:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	 tl = strlen(node->str1) + strlen(node->str2);
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:220:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	 tl = strlen(node->str1) + strlen(node->str2);
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:241:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	 *(buf+strlen(node->str1)) = '-';
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:246:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     strcpy(buf+strlen(node->str1)+1,node->str2 +1);
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:250:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     strcpy(buf+strlen(node->str1)+1,node->str2);
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:2879:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#   define yystrlen strlen
data/pcb-rnd-2.3.0/src_plugins/import_edif/edif.c:5714:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  TokenStack[TSP & TS_MASK] = strcpy((char *)Malloc(strlen(str) + 1),str);
data/pcb-rnd-2.3.0/src_plugins/import_fpcb_nl/fpcb_nl.c:60:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		for(end = s + strlen(s) - 1; (end >= s) && ((*end == '\r') || (*end == '\n')); end--) \
data/pcb-rnd-2.3.0/src_plugins/import_fpcb_nl/fpcb_nl.c:99:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					len = strlen(line);
data/pcb-rnd-2.3.0/src_plugins/import_ltspice/ltspice.c:71:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		for(end = s + strlen(s) - 1; (end >= s) && ((*end == '\r') || (*end == '\n')); end--) \
data/pcb-rnd-2.3.0/src_plugins/import_mentor_sch/mentor_sch.c:243:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c = fgetc(fn);
data/pcb-rnd-2.3.0/src_plugins/import_mentor_sch/netlist_helper.c:85:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for(__s__ = str + strlen(str) - 1; __s__ >= str; __s__--) { \
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:102:14:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while ((c = getc(fi)) != EOF) {
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:106:17:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				x1 = 100 * (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:106:29:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				x1 = 100 * (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:107:17:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				y1 = 100 * (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:107:29:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				y1 = 100 * (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:108:17:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				x2 = 100 * (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:108:29:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				x2 = 100 * (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:109:17:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				y2 = 100 * (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:109:29:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				y2 = 100 * (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:113:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				x1 = (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:113:23:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				x1 = (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:114:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				y1 = (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:114:23:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				y1 = (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:115:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				x2 = (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:115:23:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				x2 = (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:116:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				y2 = (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:116:23:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				y2 = (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:122:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				x1 = (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:122:23:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				x1 = (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:123:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				y1 = (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:123:23:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				y1 = (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:124:10:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				r = (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:124:22:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				r = (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:130:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				x1 = (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:130:23:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				x1 = (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:131:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				y1 = (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:131:23:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				y1 = (getc(fi) + (getc(fi) * 256));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:138:18:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				x1 = 100 * ((getc(fi) * 256) + getc(fi));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:138:36:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				x1 = 100 * ((getc(fi) * 256) + getc(fi));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:139:18:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				y1 = 100 * ((getc(fi) * 256) + getc(fi));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:139:36:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				y1 = 100 * ((getc(fi) * 256) + getc(fi));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:140:18:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				x2 = 100 * ((getc(fi) * 256) + getc(fi));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:140:36:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				x2 = 100 * ((getc(fi) * 256) + getc(fi));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:141:18:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				y2 = 100 * ((getc(fi) * 256) + getc(fi));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:141:36:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				y2 = 100 * ((getc(fi) * 256) + getc(fi));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:142:17:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				r = 100 * ((getc(fi) * 256) + getc(fi));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:142:35:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				r = 100 * ((getc(fi) * 256) + getc(fi));
data/pcb-rnd-2.3.0/src_plugins/import_mucs/mucs.c:149:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					c2 = getc(fi);
data/pcb-rnd-2.3.0/src_plugins/import_netlist/import_netlist.c:105:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t len = strlen(inputline);
data/pcb-rnd-2.3.0/src_plugins/import_orcad_net/orcad_net.c:68:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c = fgetc(fn);
data/pcb-rnd-2.3.0/src_plugins/import_pads_net/pads_net.c:60:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		for(end = s + strlen(s) - 1; (end >= s) && ((*end == '\r') || (*end == '\n')); end--) \
data/pcb-rnd-2.3.0/src_plugins/import_pads_net/pads_net.c:88:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(signal, s, sizeof(signal));
data/pcb-rnd-2.3.0/src_plugins/import_protel_net/protel_net.c:60:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		for(end = s + strlen(s) - 1; (end >= s) && ((*end == '\r') || (*end == '\n')); end--) \
data/pcb-rnd-2.3.0/src_plugins/import_pxm_pnm/import_pxm_pnm.c:134:16:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				ADDPX(pxm, fgetc(f), fgetc(f), fgetc(f), 0);
data/pcb-rnd-2.3.0/src_plugins/import_pxm_pnm/import_pxm_pnm.c:134:26:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				ADDPX(pxm, fgetc(f), fgetc(f), fgetc(f), 0);
data/pcb-rnd-2.3.0/src_plugins/import_pxm_pnm/import_pxm_pnm.c:134:36:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				ADDPX(pxm, fgetc(f), fgetc(f), fgetc(f), 0);
data/pcb-rnd-2.3.0/src_plugins/import_pxm_pnm/import_pxm_pnm.c:139:14:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				int px = fgetc(f);
data/pcb-rnd-2.3.0/src_plugins/import_pxm_pnm/import_pxm_pnm.c:146:9:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				c = fgetc(f);
data/pcb-rnd-2.3.0/src_plugins/import_tinycad/tinycad.c:61:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		for(end = s + strlen(s) - 1; (end >= s) && ((*end == '\r') || (*end == '\n')); end--) \
data/pcb-rnd-2.3.0/src_plugins/io_autotrax/read.c:67:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		for(end = s + strlen(s) - 1; (end >= s) && ((*end == '\r') || (*end == '\n')); end--) \
data/pcb-rnd-2.3.0/src_plugins/io_autotrax/read.c:1029:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		length = strlen(line);
data/pcb-rnd-2.3.0/src_plugins/io_autotrax/read.c:1110:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		length = strlen(line);
data/pcb-rnd-2.3.0/src_plugins/io_bxl/read.c:452:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tlen = ctx->state.text_str == NULL ? 0 : strlen(ctx->state.text_str);
data/pcb-rnd-2.3.0/src_plugins/io_bxl/read.c:639:15:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while((chr = fgetc(f)) != EOF) {
data/pcb-rnd-2.3.0/src_plugins/io_bxl/read.c:697:15:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while((chr = fgetc(f)) != EOF) {
data/pcb-rnd-2.3.0/src_plugins/io_dsn/read.c:1790:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c = fgetc(f);
data/pcb-rnd-2.3.0/src_plugins/io_dsn/read.c:1797:14:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					for(c = fgetc(f),offs++; isspace(c); c = fgetc(f),offs++) ;
data/pcb-rnd-2.3.0/src_plugins/io_dsn/read.c:1797:47:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					for(c = fgetc(f),offs++; isspace(c); c = fgetc(f),offs++) ;
data/pcb-rnd-2.3.0/src_plugins/io_dsn/read.c:1815:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c = fgetc(f);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/read_dru.c:76:11:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		int c = fgetc(f);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/read_dru.c:93:11:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		int c = fgetc(f);
data/pcb-rnd-2.3.0/src_plugins/io_eagle/read_dru.c:208:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int len = strlen(k);
data/pcb-rnd-2.3.0/src_plugins/io_hyp/hyp_l.c:2418:14:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			     (c = getc( yyin )) != EOF && c != '\n'; ++n ) \
data/pcb-rnd-2.3.0/src_plugins/io_hyp/hyp_l.c:3514:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        if ((strlen(s) != 0) && (s[strlen(s)-1] == '=')) {
data/pcb-rnd-2.3.0/src_plugins/io_hyp/hyp_l.c:3514:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        if ((strlen(s) != 0) && (s[strlen(s)-1] == '=')) {
data/pcb-rnd-2.3.0/src_plugins/io_hyp/hyp_l.c:3519:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                          yyless(strlen(s));
data/pcb-rnd-2.3.0/src_plugins/io_hyp/hyp_l.c:4451:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return yy_scan_bytes( yystr, (int) strlen(yystr) );
data/pcb-rnd-2.3.0/src_plugins/io_hyp/hyp_l.c:4754:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size_t len = strlen(src) + 1;
data/pcb-rnd-2.3.0/src_plugins/io_hyp/hyp_y.c:1379:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#   define yystrlen strlen
data/pcb-rnd-2.3.0/src_plugins/io_hyp/write.c:115:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(orig);
data/pcb-rnd-2.3.0/src_plugins/io_kicad/read.c:253:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cu = lname + strlen(lname) - 3;
data/pcb-rnd-2.3.0/src_plugins/io_kicad/read.c:898:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bbw = RND_MM_TO_COORD(2.0 * (sx+RND_COORD_TO_MM(thickness)) / 3.0 * strlen(text));
data/pcb-rnd-2.3.0/src_plugins/io_kicad/read.c:2656:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c = fgetc(FP);
data/pcb-rnd-2.3.0/src_plugins/io_kicad/read.c:2841:14:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while ((c = fgetc(f)) != EOF) {
data/pcb-rnd-2.3.0/src_plugins/io_kicad/read_net.c:197:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c = fgetc(fn);
data/pcb-rnd-2.3.0/src_plugins/io_kicad/uniq_name.c:44:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		l1 = strlen(state->unnamed);
data/pcb-rnd-2.3.0/src_plugins/io_kicad/uniq_name.c:45:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		l2 = strlen(state->suffix_sep);
data/pcb-rnd-2.3.0/src_plugins/io_kicad/uniq_name.c:55:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			l1 = strlen(orig_name);
data/pcb-rnd-2.3.0/src_plugins/io_kicad/uniq_name.c:56:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			l2 = strlen(state->suffix_sep);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/read.c:185:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(nd->data.text.value) != sizeof(minuid_str_t)-1)
data/pcb-rnd-2.3.0/src_plugins/io_lihata/read.c:374:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(val, nd->data.text.value, sizeof(val)-1);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/read.c:796:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	b64s = strlen(pmn->data.text.value);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/read.c:2286:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int name_len = strlen(stn->name);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/read.c:2768:11:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		int c = fgetc(f);
data/pcb-rnd-2.3.0/src_plugins/io_lihata/read.c:2899:14:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while ((c = fgetc(f)) != EOF) {
data/pcb-rnd-2.3.0/src_plugins/io_lihata/write.c:1789:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			end = pcb_fn + strlen(pcb_fn) - 1;
data/pcb-rnd-2.3.0/src_plugins/io_mentor_cell/read.c:1372:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(fn2, fn, RND_PATH_MAX);
data/pcb-rnd-2.3.0/src_plugins/io_pcb/attribs.c:38:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define conf_attr_prefix_len strlen(conf_attr_prefix)
data/pcb-rnd-2.3.0/src_plugins/io_pcb/attribs.c:39:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define conf_attr_prefix_inhibit_len strlen(conf_attr_prefix_inhibit)
data/pcb-rnd-2.3.0/src_plugins/io_pcb/attribs.c:55:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int path1l = strlen(path1);
data/pcb-rnd-2.3.0/src_plugins/io_pcb/attribs.c:124:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						next += strlen(LISTSEP);
data/pcb-rnd-2.3.0/src_plugins/io_pcb/file.c:160:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	bufp += strlen(bufp);
data/pcb-rnd-2.3.0/src_plugins/io_pcb/file.c:1251:14:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while ((c = fgetc(f)) != EOF) {
data/pcb-rnd-2.3.0/src_plugins/io_pcb/parse_l.c:1074:14:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			     (c = getc( yyin )) != EOF && c != '\n'; ++n ) \
data/pcb-rnd-2.3.0/src_plugins/io_pcb/parse_l.c:2341:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return yy_scan_bytes( yystr, (int) strlen(yystr) );
data/pcb-rnd-2.3.0/src_plugins/io_pcb/parse_l.c:2610:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				l += strlen(Path);
data/pcb-rnd-2.3.0/src_plugins/io_pcb/parse_l.c:2612:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			l += strlen(Filename);
data/pcb-rnd-2.3.0/src_plugins/io_pcb/parse_y.c:1313:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#   define yystrlen strlen
data/pcb-rnd-2.3.0/src_plugins/io_tedax/parse.h:12:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		for(end = s + strlen(s) - 1; (end >= s) && ((*end == '\r') || (*end == '\n')); end--) \
data/pcb-rnd-2.3.0/src_plugins/io_tedax/stackup.c:116:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((strlen(name) + strlen(key) + strlen(val)*2 + 32) >= 512) {
data/pcb-rnd-2.3.0/src_plugins/io_tedax/stackup.c:116:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((strlen(name) + strlen(key) + strlen(val)*2 + 32) >= 512) {
data/pcb-rnd-2.3.0/src_plugins/io_tedax/stackup.c:116:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((strlen(name) + strlen(key) + strlen(val)*2 + 32) >= 512) {
data/pcb-rnd-2.3.0/src_plugins/io_tedax/trouter.c:110:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(key) > 500) {
data/pcb-rnd-2.3.0/src_plugins/lib_formula/bisect.c:105:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(sunit, argv[specn].val.str, unitlen);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/act.c:215:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(a0) < sizeof(name) - 32) {
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layer_menu.c:48:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int plen = strlen(anch);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/layer_menu.c:189:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int plen = strlen(anch);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/routest.c:63:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t l = strlen(PCB->RouteStyle.array[idx].name);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/routest.c:69:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	end = path + strlen(ANCH);
data/pcb-rnd-2.3.0/src_plugins/lib_hid_pcbui/routest_dlg.c:155:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(rstdlg_ctx.name, s, sizeof(rst->name));
data/pcb-rnd-2.3.0/src_plugins/lib_vfs/lib_vfs.c:146:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buff->used = buff->alloced = strlen(buff->array);
data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/graph.c:102:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(type)*2 + strlen(name) + 64);
data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/graph.c:102:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cmd = malloc(strlen(type)*2 + strlen(name) + 64);
data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/load.c:70:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		c = fgetc(f); \
data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/load.c:82:8:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			c = fgetc(f);
data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/load.c:98:9:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			*s = fgetc(f);
data/pcb-rnd-2.3.0/src_plugins/mincut/pcb-mincut/load.c:181:8:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			c = fgetc(f);
data/pcb-rnd-2.3.0/src_plugins/order_pcbway/pcbway.c:207:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((type != NULL && strlen(type) > 128) || (strlen((char *)n->name) > 128) || (note != NULL && strlen(note) > 256) || (dflt != NULL && strlen(dflt) > 128)) {
data/pcb-rnd-2.3.0/src_plugins/order_pcbway/pcbway.c:207:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((type != NULL && strlen(type) > 128) || (strlen((char *)n->name) > 128) || (note != NULL && strlen(note) > 256) || (dflt != NULL && strlen(dflt) > 128)) {
data/pcb-rnd-2.3.0/src_plugins/order_pcbway/pcbway.c:207:99:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((type != NULL && strlen(type) > 128) || (strlen((char *)n->name) > 128) || (note != NULL && strlen(note) > 256) || (dflt != NULL && strlen(dflt) > 128)) {
data/pcb-rnd-2.3.0/src_plugins/order_pcbway/pcbway.c:207:139:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((type != NULL && strlen(type) > 128) || (strlen((char *)n->name) > 128) || (note != NULL && strlen(note) > 256) || (dflt != NULL && strlen(dflt) > 128)) {
data/pcb-rnd-2.3.0/src_plugins/order_pcbway/pcbway.c:212:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		f = calloc(sizeof(pcb_order_field_t) + strlen((char *)n->name), 1);
data/pcb-rnd-2.3.0/src_plugins/propedit/propsel.c:86:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int len = strlen(list->List[i].name);
data/pcb-rnd-2.3.0/src_plugins/query/fnc_layer_setup.c:118:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(tmp, val, len); \
data/pcb-rnd-2.3.0/src_plugins/query/query_l.c:1021:14:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			     (c = getc( yyin )) != EOF && c != '\n'; ++n ) \
data/pcb-rnd-2.3.0/src_plugins/query/query_l.c:1191:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ qry_lval.s = rnd_strdup(yytext+1); qry_lval.s[strlen(qry_lval.s)-1] = '\0'; return T_QSTR; /*"*/ }
data/pcb-rnd-2.3.0/src_plugins/query/query_l.c:1197:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ qry_lval.s = rnd_strdup(yytext+1); qry_lval.s[strlen(qry_lval.s)-1] = '\0'; return T_QSTR; }
data/pcb-rnd-2.3.0/src_plugins/query/query_l.c:2329:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return yy_scan_bytes( yystr, (int) strlen(yystr) );
data/pcb-rnd-2.3.0/src_plugins/query/query_y.c:154:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int l1 = strlen(orig), l2 = strlen(prep);
data/pcb-rnd-2.3.0/src_plugins/query/query_y.c:154:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int l1 = strlen(orig), l2 = strlen(prep);
data/pcb-rnd-2.3.0/src_plugins/query/query_y.c:1024:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#   define yystrlen strlen
data/pcb-rnd-2.3.0/src_plugins/renumber/renumber.c:248:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				sz = strlen(cnt_list[j].name) + 2;
data/pcb-rnd-2.3.0/src_plugins/renumber/renumberblock.c:58:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		new_ref = (char *) malloc(refdes_split - old_ref + strlen(num_buf) + 1);
data/pcb-rnd-2.3.0/src_plugins/renumber/renumberblock.c:103:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		new_ref = (char *) malloc(refdes_split - old_ref + strlen(num_buf) + 1);
data/pcb-rnd-2.3.0/src_plugins/script/live_script.c:116:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		dirlen = strlen(*path);
data/pcb-rnd-2.3.0/src_plugins/script/live_script.c:124:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int el, len = strlen(de->d_name);
data/pcb-rnd-2.3.0/src_plugins/script/live_script.c:148:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				el = strlen(eng);
data/pcb-rnd-2.3.0/src_plugins/script/live_script.c:428:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (fwrite(src, strlen(src), 1, f) != 1) {
data/pcb-rnd-2.3.0/src_plugins/script/timer.c:144:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(fn);
data/pcb-rnd-2.3.0/src_plugins/tool_std/tool_text.c:54:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(string) > 0) {
data/pcb-rnd-2.3.0/tests/base64/main.c:16:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ilen = strlen(str);
data/pcb-rnd-2.3.0/tests/conf/conftest.c:315:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *end = line + strlen(line) - 1;
data/pcb-rnd-2.3.0/tests/conf/conftest.c:327:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int len = strlen(start);
data/pcb-rnd-2.3.0/tests/io_bxl/test_parse.c:27:15:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while((chr = fgetc(stdin)) > 0) {
data/pcb-rnd-2.3.0/tests/remote/test_parse.c:16:11:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		int c = getchar();
data/pcb-rnd-2.3.0/util/bxl2txt/bxl2txt.c:42:16:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while((inch = fgetc(stdin)) != EOF) {
data/pcb-rnd-2.3.0/util/bxl2txt/txt2bxl.c:61:16:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while((inch = fgetc(stdin)) != EOF)
data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/gsch2pcb.c:95:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(inp);
data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/gsch2pcb.c:155:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((arg != NULL) && (strlen(arg) >= 1)) {
data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/gsch2pcb.c:156:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		s = arg + strlen(arg) - 1;
data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/gsch2pcb.c:247:3:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
		sscanf(s, "%31s %767[^\n]", config, arg);
data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/run.c:95:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			l += strlen(args.array[i]) + 3;
data/pcb-rnd-2.3.0/util/gsch2pcb-rnd/run.c:99:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			l = strlen(args.array[i]);

ANALYSIS SUMMARY:

Hits = 2497
Lines analyzed = 360114 in approximately 10.64 seconds (33838 lines/second)
Physical Source Lines of Code (SLOC) = 266866
Hits@level = [0] 2329 [1] 672 [2] 1410 [3]  20 [4] 391 [5]   4
Hits@level+ = [0+] 4826 [1+] 2497 [2+] 1825 [3+] 415 [4+] 395 [5+]   4
Hits/KSLOC@level+ = [0+] 18.084 [1+] 9.35676 [2+] 6.83864 [3+] 1.55509 [4+] 1.48014 [5+] 0.0149888
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.