Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/pcsxr-1.9.94/libpcsxcore/misc.h
Examining data/pcsxr-1.9.94/libpcsxcore/psxcounters.h
Examining data/pcsxr-1.9.94/libpcsxcore/coff.h
Examining data/pcsxr-1.9.94/libpcsxcore/cheat.c
Examining data/pcsxr-1.9.94/libpcsxcore/sio.h
Examining data/pcsxr-1.9.94/libpcsxcore/cdrom.c
Examining data/pcsxr-1.9.94/libpcsxcore/sjisfont.h
Examining data/pcsxr-1.9.94/libpcsxcore/psxmem.h
Examining data/pcsxr-1.9.94/libpcsxcore/psxcommon.c
Examining data/pcsxr-1.9.94/libpcsxcore/psxdma.h
Examining data/pcsxr-1.9.94/libpcsxcore/decode_xa.h
Examining data/pcsxr-1.9.94/libpcsxcore/psxhw.c
Examining data/pcsxr-1.9.94/libpcsxcore/ppf.c
Examining data/pcsxr-1.9.94/libpcsxcore/r3000a.h
Examining data/pcsxr-1.9.94/libpcsxcore/system.h
Examining data/pcsxr-1.9.94/libpcsxcore/psxhle.c
Examining data/pcsxr-1.9.94/libpcsxcore/misc.c
Examining data/pcsxr-1.9.94/libpcsxcore/cdrom.h
Examining data/pcsxr-1.9.94/libpcsxcore/mdec.h
Examining data/pcsxr-1.9.94/libpcsxcore/ix86/ix86.c
Examining data/pcsxr-1.9.94/libpcsxcore/ix86/ix86.h
Examining data/pcsxr-1.9.94/libpcsxcore/ix86/iR3000A.c
Examining data/pcsxr-1.9.94/libpcsxcore/ix86/iGte.h
Examining data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c
Examining data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86-64.h
Examining data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_3dnow.c
Examining data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_fpu.c
Examining data/pcsxr-1.9.94/libpcsxcore/ix86_64/iR3000A-64.c
Examining data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_mmx.c
Examining data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_sse.c
Examining data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86-64.c
Examining data/pcsxr-1.9.94/libpcsxcore/ix86_64/iGte.h
Examining data/pcsxr-1.9.94/libpcsxcore/mdec.c
Examining data/pcsxr-1.9.94/libpcsxcore/psxhw.h
Examining data/pcsxr-1.9.94/libpcsxcore/ppf.h
Examining data/pcsxr-1.9.94/libpcsxcore/gte.c
Examining data/pcsxr-1.9.94/libpcsxcore/psxinterpreter.c
Examining data/pcsxr-1.9.94/libpcsxcore/disr3000a.c
Examining data/pcsxr-1.9.94/libpcsxcore/psemu_plugin_defs.h
Examining data/pcsxr-1.9.94/libpcsxcore/plugins.c
Examining data/pcsxr-1.9.94/libpcsxcore/spu.h
Examining data/pcsxr-1.9.94/libpcsxcore/debug.h
Examining data/pcsxr-1.9.94/libpcsxcore/gpu.c
Examining data/pcsxr-1.9.94/libpcsxcore/gte.h
Examining data/pcsxr-1.9.94/libpcsxcore/ppc/ppc_mnemonics.h
Examining data/pcsxr-1.9.94/libpcsxcore/ppc/reguse.h
Examining data/pcsxr-1.9.94/libpcsxcore/ppc/ppc.h
Examining data/pcsxr-1.9.94/libpcsxcore/ppc/ppc.c
Examining data/pcsxr-1.9.94/libpcsxcore/ppc/reguse.c
Examining data/pcsxr-1.9.94/libpcsxcore/ppc/pGte.h
Examining data/pcsxr-1.9.94/libpcsxcore/ppc/pR3000A.c
Examining data/pcsxr-1.9.94/libpcsxcore/decode_xa.c
Examining data/pcsxr-1.9.94/libpcsxcore/spu.c
Examining data/pcsxr-1.9.94/libpcsxcore/psxhle.h
Examining data/pcsxr-1.9.94/libpcsxcore/sio.c
Examining data/pcsxr-1.9.94/libpcsxcore/ecm.h
Examining data/pcsxr-1.9.94/libpcsxcore/plugins.h
Examining data/pcsxr-1.9.94/libpcsxcore/psxcommon.h
Examining data/pcsxr-1.9.94/libpcsxcore/psxbios.c
Examining data/pcsxr-1.9.94/libpcsxcore/socket.c
Examining data/pcsxr-1.9.94/libpcsxcore/gpu.h
Examining data/pcsxr-1.9.94/libpcsxcore/cdriso.h
Examining data/pcsxr-1.9.94/libpcsxcore/psxbios.h
Examining data/pcsxr-1.9.94/libpcsxcore/psxdma.c
Examining data/pcsxr-1.9.94/libpcsxcore/psxmem.c
Examining data/pcsxr-1.9.94/libpcsxcore/cheat.h
Examining data/pcsxr-1.9.94/libpcsxcore/psxcounters.c
Examining data/pcsxr-1.9.94/libpcsxcore/socket.h
Examining data/pcsxr-1.9.94/libpcsxcore/debug.c
Examining data/pcsxr-1.9.94/libpcsxcore/r3000a.c
Examining data/pcsxr-1.9.94/libpcsxcore/cdriso.c
Examining data/pcsxr-1.9.94/gui/Linux.h
Examining data/pcsxr-1.9.94/gui/Plugin.c
Examining data/pcsxr-1.9.94/gui/Cheat.c
Examining data/pcsxr-1.9.94/gui/MemcardDlg.h
Examining data/pcsxr-1.9.94/gui/ConfDlg.h
Examining data/pcsxr-1.9.94/gui/DebugMemory.c
Examining data/pcsxr-1.9.94/gui/AboutDlg.c
Examining data/pcsxr-1.9.94/gui/DebugMemory.h
Examining data/pcsxr-1.9.94/gui/AboutDlg.h
Examining data/pcsxr-1.9.94/gui/MemcardDlg.c
Examining data/pcsxr-1.9.94/gui/Cheat.h
Examining data/pcsxr-1.9.94/gui/nopic.h
Examining data/pcsxr-1.9.94/gui/Config.c
Examining data/pcsxr-1.9.94/gui/ConfDlg.c
Examining data/pcsxr-1.9.94/gui/LnxMain.c
Examining data/pcsxr-1.9.94/gui/GtkGui.c
Examining data/pcsxr-1.9.94/win32/config.h
Examining data/pcsxr-1.9.94/win32/resource.h
Examining data/pcsxr-1.9.94/win32/gui/NoPic.h
Examining data/pcsxr-1.9.94/win32/gui/CheatDlg.c
Examining data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c
Examining data/pcsxr-1.9.94/win32/gui/AboutDlg.c
Examining data/pcsxr-1.9.94/win32/gui/plugin.h
Examining data/pcsxr-1.9.94/win32/gui/WndMain.c
Examining data/pcsxr-1.9.94/win32/gui/AboutDlg.h
Examining data/pcsxr-1.9.94/win32/gui/Win32.h
Examining data/pcsxr-1.9.94/win32/gui/plugin.c
Examining data/pcsxr-1.9.94/win32/glue/stdint.h
Examining data/pcsxr-1.9.94/win32/glue/sys/mman.h
Examining data/pcsxr-1.9.94/win32/zlib/uncompr.c
Examining data/pcsxr-1.9.94/win32/zlib/deflate.h
Examining data/pcsxr-1.9.94/win32/zlib/inffixed.h
Examining data/pcsxr-1.9.94/win32/zlib/inflate.c
Examining data/pcsxr-1.9.94/win32/zlib/zutil.c
Examining data/pcsxr-1.9.94/win32/zlib/inffast.h
Examining data/pcsxr-1.9.94/win32/zlib/inftrees.h
Examining data/pcsxr-1.9.94/win32/zlib/trees.h
Examining data/pcsxr-1.9.94/win32/zlib/infblock.h
Examining data/pcsxr-1.9.94/win32/zlib/infcodes.h
Examining data/pcsxr-1.9.94/win32/zlib/infutil.c
Examining data/pcsxr-1.9.94/win32/zlib/infutil.h
Examining data/pcsxr-1.9.94/win32/zlib/infcodes.c
Examining data/pcsxr-1.9.94/win32/zlib/zconf.h
Examining data/pcsxr-1.9.94/win32/zlib/compress.c
Examining data/pcsxr-1.9.94/win32/zlib/infblock.c
Examining data/pcsxr-1.9.94/win32/zlib/trees.c
Examining data/pcsxr-1.9.94/win32/zlib/zlib.h
Examining data/pcsxr-1.9.94/win32/zlib/gzio.c
Examining data/pcsxr-1.9.94/win32/zlib/zutil.h
Examining data/pcsxr-1.9.94/win32/zlib/adler32.c
Examining data/pcsxr-1.9.94/win32/zlib/inftrees.c
Examining data/pcsxr-1.9.94/win32/zlib/deflate.c
Examining data/pcsxr-1.9.94/win32/zlib/crc32.c
Examining data/pcsxr-1.9.94/win32/zlib/inffast.c
Examining data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/dsound.c
Examining data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/record.c
Examining data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/dsound.h
Examining data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/psemu.c
Examining data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/cfg.c
Examining data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/debug.h
Examining data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/record.h
Examining data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/debug.c
Examining data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/winmain.c
Examining data/pcsxr-1.9.94/win32/plugins/dfsound/resource.h
Examining data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.h
Examining data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp
Examining data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSXres.h
Examining data/pcsxr-1.9.94/win32/plugins/bladesio1/winsrc/stdafx.h
Examining data/pcsxr-1.9.94/win32/plugins/bladesio1/winsrc/cfg-winapi.h
Examining data/pcsxr-1.9.94/win32/plugins/bladesio1/winsrc/cfg-winapi.c
Examining data/pcsxr-1.9.94/win32/plugins/bladesio1/winsrc/winmain.c
Examining data/pcsxr-1.9.94/win32/plugins/bladesio1/resource.h
Examining data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/ssave.h
Examining data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/fps.c
Examining data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c
Examining data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/ssave.c
Examining data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/key.c
Examining data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/winmain.c
Examining data/pcsxr-1.9.94/win32/plugins/peopsxgl/resource.h
Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/fps.c
Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.c
Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/draw.c
Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/d3dcaps.h
Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/d3dtypes.h
Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/dxguid.c
Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c
Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.h
Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/ddraw.h
Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/key.c
Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/d3d.h
Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/winmain.c
Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/resource.h
Examining data/pcsxr-1.9.94/win32/intl/dgettext.c
Examining data/pcsxr-1.9.94/win32/intl/hash-string.h
Examining data/pcsxr-1.9.94/win32/intl/intlconfig.h
Examining data/pcsxr-1.9.94/win32/intl/finddomain.c
Examining data/pcsxr-1.9.94/win32/intl/dcgettext.c
Examining data/pcsxr-1.9.94/win32/intl/libintl.h
Examining data/pcsxr-1.9.94/win32/intl/gettext.c
Examining data/pcsxr-1.9.94/win32/intl/loadmsgcat.c
Examining data/pcsxr-1.9.94/win32/intl/gettext.h
Examining data/pcsxr-1.9.94/win32/intl/bindtextdom.c
Examining data/pcsxr-1.9.94/win32/intl/localealias.c
Examining data/pcsxr-1.9.94/win32/intl/explodename.c
Examining data/pcsxr-1.9.94/win32/intl/intl-compat.c
Examining data/pcsxr-1.9.94/win32/intl/textdomain.c
Examining data/pcsxr-1.9.94/win32/intl/libgettext.h
Examining data/pcsxr-1.9.94/win32/intl/l10nflist.c
Examining data/pcsxr-1.9.94/win32/intl/gettextP.h
Examining data/pcsxr-1.9.94/win32/intl/loadinfo.h
Examining data/pcsxr-1.9.94/plugins/dfsound/dma.c
Examining data/pcsxr-1.9.94/plugins/dfsound/registers.c
Examining data/pcsxr-1.9.94/plugins/dfsound/gauss_i.h
Examining data/pcsxr-1.9.94/plugins/dfsound/nullsnd.c
Examining data/pcsxr-1.9.94/plugins/dfsound/adsr.h
Examining data/pcsxr-1.9.94/plugins/dfsound/dma.h
Examining data/pcsxr-1.9.94/plugins/dfsound/reverb.c
Examining data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c
Examining data/pcsxr-1.9.94/plugins/dfsound/externals.h
Examining data/pcsxr-1.9.94/plugins/dfsound/regs.h
Examining data/pcsxr-1.9.94/plugins/dfsound/cfg.c
Examining data/pcsxr-1.9.94/plugins/dfsound/stdafx.h
Examining data/pcsxr-1.9.94/plugins/dfsound/spu.h
Examining data/pcsxr-1.9.94/plugins/dfsound/psemuxa.h
Examining data/pcsxr-1.9.94/plugins/dfsound/sdl.c
Examining data/pcsxr-1.9.94/plugins/dfsound/spu.c
Examining data/pcsxr-1.9.94/plugins/dfsound/externals.c
Examining data/pcsxr-1.9.94/plugins/dfsound/openal.c
Examining data/pcsxr-1.9.94/plugins/dfsound/oss.c
Examining data/pcsxr-1.9.94/plugins/dfsound/reverb.h
Examining data/pcsxr-1.9.94/plugins/dfsound/adsr.c
Examining data/pcsxr-1.9.94/plugins/dfsound/alsa.c
Examining data/pcsxr-1.9.94/plugins/dfsound/registers.h
Examining data/pcsxr-1.9.94/plugins/dfsound/xa.h
Examining data/pcsxr-1.9.94/plugins/dfsound/xa.c
Examining data/pcsxr-1.9.94/plugins/dfsound/cfg.h
Examining data/pcsxr-1.9.94/plugins/dfsound/pulseaudio.c
Examining data/pcsxr-1.9.94/plugins/dfsound/dsoundoss.h
Examining data/pcsxr-1.9.94/plugins/dfsound/freeze.c
Examining data/pcsxr-1.9.94/plugins/dfinput/pad.c
Examining data/pcsxr-1.9.94/plugins/dfinput/util.h
Examining data/pcsxr-1.9.94/plugins/dfinput/util.c
Examining data/pcsxr-1.9.94/plugins/dfinput/sdljoy.c
Examining data/pcsxr-1.9.94/plugins/dfinput/analog.c
Examining data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c
Examining data/pcsxr-1.9.94/plugins/dfinput/cfg.c
Examining data/pcsxr-1.9.94/plugins/dfinput/pad.h
Examining data/pcsxr-1.9.94/plugins/dfinput/xkb.c
Examining data/pcsxr-1.9.94/plugins/bladesio1/connection.h
Examining data/pcsxr-1.9.94/plugins/bladesio1/fifo.h
Examining data/pcsxr-1.9.94/plugins/bladesio1/sio1.h
Examining data/pcsxr-1.9.94/plugins/bladesio1/cfg.c
Examining data/pcsxr-1.9.94/plugins/bladesio1/typedefs.h
Examining data/pcsxr-1.9.94/plugins/bladesio1/fifo.c
Examining data/pcsxr-1.9.94/plugins/bladesio1/sio1.c
Examining data/pcsxr-1.9.94/plugins/bladesio1/connection.c
Examining data/pcsxr-1.9.94/plugins/bladesio1/gui.c
Examining data/pcsxr-1.9.94/plugins/peopsxgl/fps.c
Examining data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c
Examining data/pcsxr-1.9.94/plugins/peopsxgl/prim.c
Examining data/pcsxr-1.9.94/plugins/peopsxgl/draw.c
Examining data/pcsxr-1.9.94/plugins/peopsxgl/draw.h
Examining data/pcsxr-1.9.94/plugins/peopsxgl/texture.h
Examining data/pcsxr-1.9.94/plugins/peopsxgl/gte_accuracy.h
Examining data/pcsxr-1.9.94/plugins/peopsxgl/menu.c
Examining data/pcsxr-1.9.94/plugins/peopsxgl/externals.h
Examining data/pcsxr-1.9.94/plugins/peopsxgl/soft.h
Examining data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c
Examining data/pcsxr-1.9.94/plugins/peopsxgl/gl_ext.h
Examining data/pcsxr-1.9.94/plugins/peopsxgl/stdafx.h
Examining data/pcsxr-1.9.94/plugins/peopsxgl/menu.h
Examining data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c
Examining data/pcsxr-1.9.94/plugins/peopsxgl/fps.h
Examining data/pcsxr-1.9.94/plugins/peopsxgl/prim.h
Examining data/pcsxr-1.9.94/plugins/peopsxgl/texture.c
Examining data/pcsxr-1.9.94/plugins/peopsxgl/soft.c
Examining data/pcsxr-1.9.94/plugins/peopsxgl/gpu.h
Examining data/pcsxr-1.9.94/plugins/peopsxgl/key.c
Examining data/pcsxr-1.9.94/plugins/peopsxgl/gte_accuracy.c
Examining data/pcsxr-1.9.94/plugins/peopsxgl/cfg.h
Examining data/pcsxr-1.9.94/plugins/peopsxgl/key.h
Examining data/pcsxr-1.9.94/plugins/dfnet/unix.c
Examining data/pcsxr-1.9.94/plugins/dfnet/gui.c
Examining data/pcsxr-1.9.94/plugins/dfnet/cfg.c
Examining data/pcsxr-1.9.94/plugins/dfnet/dfnet.c
Examining data/pcsxr-1.9.94/plugins/dfnet/dfnet.h
Examining data/pcsxr-1.9.94/plugins/dfcdrom/util.c
Examining data/pcsxr-1.9.94/plugins/dfcdrom/cdr-null.c
Examining data/pcsxr-1.9.94/plugins/dfcdrom/cdr-libcdio.c
Examining data/pcsxr-1.9.94/plugins/dfcdrom/cdr-linux.c
Examining data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c
Examining data/pcsxr-1.9.94/plugins/dfcdrom/cdrcfg-0.1df/main.c
Examining data/pcsxr-1.9.94/plugins/dfcdrom/cfg.c
Examining data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h
Examining data/pcsxr-1.9.94/plugins/dfxvideo/fps.c
Examining data/pcsxr-1.9.94/plugins/dfxvideo/swap.h
Examining data/pcsxr-1.9.94/plugins/dfxvideo/prim.c
Examining data/pcsxr-1.9.94/plugins/dfxvideo/hq2x.h
Examining data/pcsxr-1.9.94/plugins/dfxvideo/draw.c
Examining data/pcsxr-1.9.94/plugins/dfxvideo/draw.h
Examining data/pcsxr-1.9.94/plugins/dfxvideo/hq3x.h
Examining data/pcsxr-1.9.94/plugins/dfxvideo/menu.c
Examining data/pcsxr-1.9.94/plugins/dfxvideo/externals.h
Examining data/pcsxr-1.9.94/plugins/dfxvideo/zn.c
Examining data/pcsxr-1.9.94/plugins/dfxvideo/soft.h
Examining data/pcsxr-1.9.94/plugins/dfxvideo/interp.h
Examining data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c
Examining data/pcsxr-1.9.94/plugins/dfxvideo/menu.h
Examining data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c
Examining data/pcsxr-1.9.94/plugins/dfxvideo/fps.h
Examining data/pcsxr-1.9.94/plugins/dfxvideo/prim.h
Examining data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c
Examining data/pcsxr-1.9.94/plugins/dfxvideo/soft.c
Examining data/pcsxr-1.9.94/plugins/dfxvideo/gpu.h
Examining data/pcsxr-1.9.94/plugins/dfxvideo/key.c
Examining data/pcsxr-1.9.94/plugins/dfxvideo/cfg.h
Examining data/pcsxr-1.9.94/plugins/dfxvideo/key.h
Examining data/pcsxr-1.9.94/macosx/PcsxrDiscHandler.h
Examining data/pcsxr-1.9.94/macosx/ConfigurationController.h
Examining data/pcsxr-1.9.94/macosx/HotkeyController.h
Examining data/pcsxr-1.9.94/macosx/PcsxrPluginHandler.h
Examining data/pcsxr-1.9.94/macosx/PcsxrMemCardArray.h
Examining data/pcsxr-1.9.94/macosx/config.h
Examining data/pcsxr-1.9.94/macosx/Plugin.c
Examining data/pcsxr-1.9.94/macosx/CheatController.h
Examining data/pcsxr-1.9.94/macosx/MemBadgeView.h
Examining data/pcsxr-1.9.94/macosx/PcsxrHexadecimalFormatter.h
Examining data/pcsxr-1.9.94/macosx/PcsxrMemCardController.h
Examining data/pcsxr-1.9.94/macosx/PcsxrCheatHandler.h
Examining data/pcsxr-1.9.94/macosx/PluginList.h
Examining data/pcsxr-1.9.94/macosx/PcsxrMemCardHandler.h
Examining data/pcsxr-1.9.94/macosx/PcsxrPlugin.h
Examining data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/PluginConfigController.h
Examining data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cfg.c
Examining data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c
Examining data/pcsxr-1.9.94/macosx/plugins/Bladesio1/macsrc/PluginConfigController.h
Examining data/pcsxr-1.9.94/macosx/plugins/Bladesio1/macsrc/cfg.c
Examining data/pcsxr-1.9.94/macosx/plugins/DFSound/macsrc/NamedSlider.h
Examining data/pcsxr-1.9.94/macosx/plugins/DFSound/macsrc/maccfg.h
Examining data/pcsxr-1.9.94/macosx/plugins/DFSound/macsrc/SPUPluginController.h
Examining data/pcsxr-1.9.94/macosx/plugins/DFSound/macsrc/PluginController.h
Examining data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/PadView.h
Examining data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/PadController.h
Examining data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/ControllerList.h
Examining data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/MappingCell.h
Examining data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c
Examining data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/xkb.c
Examining data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.h
Examining data/pcsxr-1.9.94/macosx/plugins/DFXVideo/macsrc/PluginGLView.h
Examining data/pcsxr-1.9.94/macosx/plugins/DFXVideo/macsrc/PluginConfigController.h
Examining data/pcsxr-1.9.94/macosx/plugins/DFXVideo/macsrc/ExtendedKeys.h
Examining data/pcsxr-1.9.94/macosx/plugins/DFXVideo/macsrc/PluginWindow.h
Examining data/pcsxr-1.9.94/macosx/plugins/DFXVideo/macsrc/SGPUPreferences.h
Examining data/pcsxr-1.9.94/macosx/plugins/DFXVideo/macsrc/PluginWindowController.h
Examining data/pcsxr-1.9.94/macosx/plugins/PeopsXgl/macsrc/drawgl.h
Examining data/pcsxr-1.9.94/macosx/plugins/PeopsXgl/macsrc/PluginGLView.h
Examining data/pcsxr-1.9.94/macosx/plugins/PeopsXgl/macsrc/NetSfPeopsOpenGLPluginConfigController.h
Examining data/pcsxr-1.9.94/macosx/plugins/PeopsXgl/macsrc/ExtendedKeys.h
Examining data/pcsxr-1.9.94/macosx/plugins/PeopsXgl/macsrc/PluginWindow.h
Examining data/pcsxr-1.9.94/macosx/plugins/PeopsXgl/macsrc/PluginWindowController.h
Examining data/pcsxr-1.9.94/macosx/plugins/DFNet/macsrc/PluginConfigController.h
Examining data/pcsxr-1.9.94/macosx/plugins/DFNet/macsrc/cfg.c
Examining data/pcsxr-1.9.94/macosx/plugins/DFNet/macsrc/SockDialog.h
Examining data/pcsxr-1.9.94/macosx/PcsxrFileHandle.h
Examining data/pcsxr-1.9.94/macosx/OSXPlugLocalization.h
Examining data/pcsxr-1.9.94/macosx/PcsxrController.h
Examining data/pcsxr-1.9.94/macosx/hotkeys.h
Examining data/pcsxr-1.9.94/macosx/ExtendedKeys.h
Examining data/pcsxr-1.9.94/macosx/PcsxrFreezeStateHandler.h
Examining data/pcsxr-1.9.94/macosx/PluginController.h
Examining data/pcsxr-1.9.94/macosx/PcsxrMemoryObject.h
Examining data/pcsxr-1.9.94/macosx/LaunchArg.h
Examining data/pcsxr-1.9.94/macosx/EmuThread.h
Examining data/pcsxr-1.9.94/macosx/RecentItemsMenu.h

FINAL RESULTS:

data/pcsxr-1.9.94/win32/gui/WndMain.c:983:10:  [5] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120). Risk is high,
  it appears that the size is given as bytes, but the function requires size
  as characters.
					if (MultiByteToWideChar(932, 0, (LPCSTR)Info->sTitle, -1, (LPWSTR)buf, sizeof(buf)) == 0) {
data/pcsxr-1.9.94/win32/intl/gettext.c:72:6:  [5] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120). Risk is high,
  it appears that the size is given as bytes, but the function requires size
  as characters.
	if (MultiByteToWideChar(CP_UTF8, 0, (LPCSTR)t, -1, (LPWSTR)buf, sizeof(buf)) == 0) {
data/pcsxr-1.9.94/gui/ConfDlg.c:85:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(conf, (char *)list[row * 2]); \
data/pcsxr-1.9.94/gui/ConfDlg.c:125:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(Config.PluginsDir, path);
data/pcsxr-1.9.94/gui/ConfDlg.c:245:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Gpu);
data/pcsxr-1.9.94/gui/ConfDlg.c:266:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Spu);
data/pcsxr-1.9.94/gui/ConfDlg.c:287:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Cdr);
data/pcsxr-1.9.94/gui/ConfDlg.c:308:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Sio1);
data/pcsxr-1.9.94/gui/ConfDlg.c:329:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Pad1);
data/pcsxr-1.9.94/gui/ConfDlg.c:345:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Pad2);
data/pcsxr-1.9.94/gui/ConfDlg.c:485:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(Config.PluginsDir, path);
data/pcsxr-1.9.94/gui/ConfDlg.c:501:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(Config.BiosDir, foldername);
data/pcsxr-1.9.94/gui/ConfDlg.c:528:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(type##ConfS.plist[type##ConfS.plugins - 1], name); \
data/pcsxr-1.9.94/gui/ConfDlg.c:529:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(type##ConfS.plist[type##ConfS.plugins - 2], ent->d_name); \
data/pcsxr-1.9.94/gui/ConfDlg.c:635:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(BiosConfS.plist[BiosConfS.plugins - 1], bios_name);
data/pcsxr-1.9.94/gui/ConfDlg.c:636:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(BiosConfS.plist[BiosConfS.plugins - 2], internal_name);
data/pcsxr-1.9.94/gui/ConfDlg.c:731:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(name, "%s", PSE_getLibName());
data/pcsxr-1.9.94/gui/ConfDlg.c:738:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(name, ver);
data/pcsxr-1.9.94/gui/ConfDlg.c:741:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		else strcpy(name, ent->d_name);
data/pcsxr-1.9.94/gui/ConfDlg.c:807:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(plugin, "%s/%s", Config.PluginsDir, ent->d_name);
data/pcsxr-1.9.94/gui/ConfDlg.c:823:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(name, "%s", PSE_getLibName());
data/pcsxr-1.9.94/gui/ConfDlg.c:830:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
					strcat(name, ver);
data/pcsxr-1.9.94/gui/ConfDlg.c:833:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			else strcpy(name, ent->d_name);
data/pcsxr-1.9.94/gui/Config.c:85:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(cfgfile, PCSXR_DOT_DIR);
data/pcsxr-1.9.94/gui/Config.c:89:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(cfgfile, cfgfile_basename);
data/pcsxr-1.9.94/gui/GtkGui.c:670:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(current_folder, Config.IsoImgDir);
data/pcsxr-1.9.94/gui/GtkGui.c:672:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(current_folder, getenv("HOME"));
data/pcsxr-1.9.94/gui/GtkGui.c:710:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		  strcpy(current_folder, path);
data/pcsxr-1.9.94/gui/GtkGui.c:726:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		  strcpy(Config.IsoImgDir, current_folder);
data/pcsxr-1.9.94/gui/GtkGui.c:953:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(Text, _("Loaded state %s."), state_filename);
data/pcsxr-1.9.94/gui/GtkGui.c:956:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(Text, _("Error loading state %s!"), state_filename);
data/pcsxr-1.9.94/gui/GtkGui.c:978:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(Text, _("Saved state %s."), state_filename);
data/pcsxr-1.9.94/gui/GtkGui.c:980:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(Text, _("Error saving state %s!"), state_filename);
data/pcsxr-1.9.94/gui/GtkGui.c:1079:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf(msg, fmt, list);
data/pcsxr-1.9.94/gui/LnxMain.c:58:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(conf_mcd, mcd);
data/pcsxr-1.9.94/gui/LnxMain.c:270:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(conf_plugin_name, plugin_name);
data/pcsxr-1.9.94/gui/LnxMain.c:318:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
					strcat(path, isofilename);
data/pcsxr-1.9.94/gui/LnxMain.c:319:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					strcpy(isofilename, path);
data/pcsxr-1.9.94/gui/LnxMain.c:330:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			 printf(PACKAGE_STRING "\n");
data/pcsxr-1.9.94/gui/LnxMain.c:350:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
					strcat(path, file);
data/pcsxr-1.9.94/gui/LnxMain.c:351:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					strcpy(file, path);
data/pcsxr-1.9.94/gui/LnxMain.c:377:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(Config.BiosDir, str_bios_dir);
data/pcsxr-1.9.94/gui/LnxMain.c:381:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(Config.PluginsDir, str_plugin_dir);
data/pcsxr-1.9.94/gui/LnxMain.c:408:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(Config.PatchesDir,  str_patches_dir);
data/pcsxr-1.9.94/gui/LnxMain.c:518:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf(msg, fmt, list);
data/pcsxr-1.9.94/gui/LnxMain.c:525:3:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		printf(linestart ? " * %s" : "%s", msg);
data/pcsxr-1.9.94/gui/MemcardDlg.c:678:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(Config.Mcd1, str);
data/pcsxr-1.9.94/gui/MemcardDlg.c:684:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(Config.Mcd2, str);
data/pcsxr-1.9.94/gui/Plugin.c:328:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(dst, ptr+1); \
data/pcsxr-1.9.94/gui/Plugin.c:368:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(info.EmuName, "PCSXR " PACKAGE_VERSION);
data/pcsxr-1.9.94/gui/Plugin.c:376:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(path, "%s%s", Config.BiosDir, Config.Bios);
data/pcsxr-1.9.94/gui/Plugin.c:377:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(info.BIOSpath, path);
data/pcsxr-1.9.94/gui/Plugin.c:378:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(info.MCD1path, Config.Mcd1);
data/pcsxr-1.9.94/gui/Plugin.c:379:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(info.MCD2path, Config.Mcd2);
data/pcsxr-1.9.94/gui/Plugin.c:380:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(path, "%s%s", dotdir, Config.Gpu);
data/pcsxr-1.9.94/gui/Plugin.c:381:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(info.GPUpath, path);
data/pcsxr-1.9.94/gui/Plugin.c:382:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(path, "%s%s", dotdir, Config.Spu);
data/pcsxr-1.9.94/gui/Plugin.c:383:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(info.SPUpath, path);
data/pcsxr-1.9.94/gui/Plugin.c:384:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(path, "%s%s", dotdir, Config.Cdr);
data/pcsxr-1.9.94/gui/Plugin.c:385:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(info.CDRpath, path);
data/pcsxr-1.9.94/gui/Plugin.c:400:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(Config.Mcd1, info.MCD1path);
data/pcsxr-1.9.94/gui/Plugin.c:401:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(Config.Mcd2, info.MCD2path);
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:450:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(tocname, isofile);
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:644:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					strcpy(ti[numtracks].filepath, filepath);
data/pcsxr-1.9.94/libpcsxcore/debug.c:399:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(reply, "219 %s\r\n", disR3000AF(psxMemRead32(psxRegs.pc), psxRegs.pc));
data/pcsxr-1.9.94/libpcsxcore/debug.c:456:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(reply, "200 %s\r\n", arguments == NULL ? "OK" : arguments);
data/pcsxr-1.9.94/libpcsxcore/debug.c:459:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(reply, "201 %s\r\n", PACKAGE_VERSION);
data/pcsxr-1.9.94/libpcsxcore/debug.c:473:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "511 Malformed 111 command '%s'\r\n", cmd);
data/pcsxr-1.9.94/libpcsxcore/debug.c:480:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "%s211 %02X(%2.2s)=%08X\r\n", reply, i, disRNameGPR[i], psxRegs.GPR.r[i]);
data/pcsxr-1.9.94/libpcsxcore/debug.c:496:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "511 Malformed 113 command '%s'\r\n", cmd);
data/pcsxr-1.9.94/libpcsxcore/debug.c:503:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "%s213 %02X(%8.8s)=%08X\r\n", reply, i, disRNameCP0[i], psxRegs.CP0.r[i]);
data/pcsxr-1.9.94/libpcsxcore/debug.c:516:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "511 Malformed 114 command '%s'\r\n", cmd);
data/pcsxr-1.9.94/libpcsxcore/debug.c:523:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "%s214 %02X(%6.6s)=%08X\r\n", reply, i, disRNameCP2C[i], psxRegs.CP2C.r[i]);
data/pcsxr-1.9.94/libpcsxcore/debug.c:536:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "511 Malformed 111 command '%s'\r\n", cmd);
data/pcsxr-1.9.94/libpcsxcore/debug.c:543:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "%s215 %02X(%4.4s)=%08X\r\n", reply, i, disRNameCP2D[i], psxRegs.CP2D.r[i]);
data/pcsxr-1.9.94/libpcsxcore/debug.c:556:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "511 Malformed 119 command '%s'\r\n", cmd);
data/pcsxr-1.9.94/libpcsxcore/debug.c:563:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(reply, "219 %s\r\n", disR3000AF(psxMemRead32(code), code));
data/pcsxr-1.9.94/libpcsxcore/debug.c:567:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(reply, "500 Malformed 121 command '%s'\r\n", arguments);
data/pcsxr-1.9.94/libpcsxcore/debug.c:585:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(reply, "512 Invalid LO/HI register: '%s'\r\n", arguments);
data/pcsxr-1.9.94/libpcsxcore/debug.c:590:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(reply, "500 Malformed 122 command '%s'\r\n", arguments);
data/pcsxr-1.9.94/libpcsxcore/debug.c:598:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(reply, "500 Malformed 123 command '%s'\r\n", arguments);
data/pcsxr-1.9.94/libpcsxcore/debug.c:611:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(reply, "500 Malformed 124 command '%s'\r\n", arguments);
data/pcsxr-1.9.94/libpcsxcore/debug.c:624:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(reply, "500 Malformed 121 command '%s'\r\n", arguments);
data/pcsxr-1.9.94/libpcsxcore/debug.c:637:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(reply, "500 Malformed 130 command '%s'\r\n", arguments);
data/pcsxr-1.9.94/libpcsxcore/debug.c:646:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(reply, "513 Invalid address or range: '%s'\r\n", arguments);
data/pcsxr-1.9.94/libpcsxcore/debug.c:651:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(reply, "500 Malformed 140 command '%s'\r\n", arguments);
data/pcsxr-1.9.94/libpcsxcore/debug.c:659:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(reply, "514 Invalid address or range: '%s'\r\n", arguments);
data/pcsxr-1.9.94/libpcsxcore/debug.c:666:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "500 Malformed 150 command '%s'\r\n", cmd);
data/pcsxr-1.9.94/libpcsxcore/debug.c:679:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(reply, "250 Mapping of exec flow %s\r\n", code ? "started" : "stopped");
data/pcsxr-1.9.94/libpcsxcore/debug.c:685:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "500 Malformed 151 command '%s'\r\n", cmd);
data/pcsxr-1.9.94/libpcsxcore/debug.c:697:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(reply, "251 Mapping of read8 flow %s\r\n", code ? "started" : "stopped");
data/pcsxr-1.9.94/libpcsxcore/debug.c:703:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "500 Malformed 152 command '%s'\r\n", cmd);
data/pcsxr-1.9.94/libpcsxcore/debug.c:715:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(reply, "252 Mapping of read16 flow %s\r\n", code ? "started" : "stopped");
data/pcsxr-1.9.94/libpcsxcore/debug.c:721:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "500 Malformed 153 command '%s'\r\n", cmd);
data/pcsxr-1.9.94/libpcsxcore/debug.c:733:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(reply, "253 Mapping of read32 flow %s\r\n", code ? "started" : "stopped");
data/pcsxr-1.9.94/libpcsxcore/debug.c:739:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "500 Malformed 154 command '%s'\r\n", cmd);
data/pcsxr-1.9.94/libpcsxcore/debug.c:751:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(reply, "254 Mapping of write8 flow %s\r\n", code ? "started" : "stopped");
data/pcsxr-1.9.94/libpcsxcore/debug.c:757:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "500 Malformed 155 command '%s'\r\n", cmd);
data/pcsxr-1.9.94/libpcsxcore/debug.c:769:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(reply, "255 Mapping of write16 flow %s\r\n", code ? "started" : "stopped");
data/pcsxr-1.9.94/libpcsxcore/debug.c:775:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "500 Malformed 156 command '%s'\r\n", cmd);
data/pcsxr-1.9.94/libpcsxcore/debug.c:787:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(reply, "256 Mapping of write32 flow %s\r\n", code ? "started" : "stopped");
data/pcsxr-1.9.94/libpcsxcore/debug.c:793:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "500 Malformed 160 command '%s'\r\n", cmd);
data/pcsxr-1.9.94/libpcsxcore/debug.c:802:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(reply, "260 Break on map of exec flow %s\r\n", code ? "started" : "stopped");
data/pcsxr-1.9.94/libpcsxcore/debug.c:808:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "500 Malformed 161 command '%s'\r\n", cmd);
data/pcsxr-1.9.94/libpcsxcore/debug.c:817:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(reply, "261 Break on map of read8 flow %s\r\n", code ? "started" : "stopped");
data/pcsxr-1.9.94/libpcsxcore/debug.c:823:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "500 Malformed 162 command '%s'\r\n", cmd);
data/pcsxr-1.9.94/libpcsxcore/debug.c:832:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(reply, "262 Break on map of read16 flow %s\r\n", code ? "started" : "stopped");
data/pcsxr-1.9.94/libpcsxcore/debug.c:838:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "500 Malformed 163 command '%s'\r\n", cmd);
data/pcsxr-1.9.94/libpcsxcore/debug.c:847:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(reply, "263 Break on map of read32 flow %s\r\n", code ? "started" : "stopped");
data/pcsxr-1.9.94/libpcsxcore/debug.c:853:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "500 Malformed 164 command '%s'\r\n", cmd);
data/pcsxr-1.9.94/libpcsxcore/debug.c:862:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(reply, "264 Break on map of write8 flow %s\r\n", code ? "started" : "stopped");
data/pcsxr-1.9.94/libpcsxcore/debug.c:868:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "500 Malformed 165 command '%s'\r\n", cmd);
data/pcsxr-1.9.94/libpcsxcore/debug.c:877:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(reply, "265 Break on map of write16 flow %s\r\n", code ? "started" : "stopped");
data/pcsxr-1.9.94/libpcsxcore/debug.c:883:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "500 Malformed 166 command '%s'\r\n", cmd);
data/pcsxr-1.9.94/libpcsxcore/debug.c:892:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(reply, "266 Break on map of write32 flow %s\r\n", code ? "started" : "stopped");
data/pcsxr-1.9.94/libpcsxcore/debug.c:926:25:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                        sprintf(reply, "%s400 %X@%08X-%s\r\n", reply, bp->number, bp->address, breakpoint_type_names[bp->type]);
data/pcsxr-1.9.94/libpcsxcore/debug.c:933:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(reply, "400 %X@%08X-%s\r\n", bp->number, bp->address, breakpoint_type_names[bp->type]);
data/pcsxr-1.9.94/libpcsxcore/debug.c:958:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(reply, "500 Malformed 310 command '%s'\r\n", arguments);
data/pcsxr-1.9.94/libpcsxcore/debug.c:970:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(reply, "500 Malformed 320 command '%s'\r\n", arguments);
data/pcsxr-1.9.94/libpcsxcore/debug.c:982:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(reply, "500 Malformed 321 command '%s'\r\n", arguments);
data/pcsxr-1.9.94/libpcsxcore/debug.c:994:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(reply, "500 Malformed 322 command '%s'\r\n", arguments);
data/pcsxr-1.9.94/libpcsxcore/debug.c:1006:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(reply, "500 Malformed 330 command '%s'\r\n", arguments);
data/pcsxr-1.9.94/libpcsxcore/debug.c:1018:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(reply, "500 Malformed 331 command '%s'\r\n", arguments);
data/pcsxr-1.9.94/libpcsxcore/debug.c:1030:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(reply, "500 Malformed 332 command '%s'\r\n", arguments);
data/pcsxr-1.9.94/libpcsxcore/debug.c:1067:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(reply, "496 Printing %s\r\n", printpc ? "enabled" : "disabled");
data/pcsxr-1.9.94/libpcsxcore/debug.c:1082:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(reply, "500 Unknown command '%s'\r\n", cmd);
data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:88:18:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define dName(i)	sprintf(ostr, "%s %-7s,", ostr, i)
data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:89:18:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define dGPR(i)		sprintf(ostr, "%s %8.8x (%s),", ostr, psxRegs.GPR.r[i], disRNameGPR[i])
data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:90:18:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define dCP0(i)		sprintf(ostr, "%s %8.8x (%s),", ostr, psxRegs.CP0.r[i], disRNameCP0[i])
data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:91:18:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define dCP2D(i)	sprintf(ostr, "%s %8.8x (%s),", ostr, psxRegs.CP2D.r[i], disRNameCP2D[i])
data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:92:18:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define dCP2C(i)	sprintf(ostr, "%s %8.8x (%s),", ostr, psxRegs.CP2C.r[i], disRNameCP2C[i])
data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:93:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define dHI()		sprintf(ostr, "%s %8.8x (%s),", ostr, psxRegs.GPR.n.hi, "hi")
data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:94:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define dLO()		sprintf(ostr, "%s %8.8x (%s),", ostr, psxRegs.GPR.n.lo, "lo")
data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:95:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define dImm()		sprintf(ostr, "%s %4.4x (%d),", ostr, _Im_, _Im_)
data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:96:19:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define dTarget()	sprintf(ostr, "%s %8.8x,", ostr, _Target_)
data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:97:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define dSa()		sprintf(ostr, "%s %2.2x (%d),", ostr, _Sa_, _Sa_)
data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:98:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define dOfB()		sprintf(ostr, "%s %4.4x (%8.8x (%s)),", ostr, _Im_, psxRegs.GPR.r[_Rs_], disRNameGPR[_Rs_])
data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:99:19:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define dOffset()	sprintf(ostr, "%s %8.8x,", ostr, _Branch_)
data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:100:18:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define dCode()		sprintf(ostr, "%s %8.8x,", ostr, (code >> 6) & 0xffffff)
data/pcsxr-1.9.94/libpcsxcore/ix86/iR3000A.c:362:2:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	system("ndisasmw -u dump1");
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:367:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				 strcat(cpuinfo.x86Fam,AMDspeedString);
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:378:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				 strcat(cpuinfo.x86Fam,AMDspeedString);
data/pcsxr-1.9.94/libpcsxcore/misc.c:390:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s/libps.exe", Config.BiosDir);
data/pcsxr-1.9.94/libpcsxcore/plugins.c:740:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Cdr);
data/pcsxr-1.9.94/libpcsxcore/plugins.c:744:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Gpu);
data/pcsxr-1.9.94/libpcsxcore/plugins.c:747:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Spu);
data/pcsxr-1.9.94/libpcsxcore/plugins.c:750:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Pad1);
data/pcsxr-1.9.94/libpcsxcore/plugins.c:753:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Pad2);
data/pcsxr-1.9.94/libpcsxcore/plugins.c:760:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Net);
data/pcsxr-1.9.94/libpcsxcore/plugins.c:765:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Sio1);
data/pcsxr-1.9.94/libpcsxcore/ppf.c:210:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(szPPF, "%s/%s", Config.PatchesDir, buffer);
data/pcsxr-1.9.94/libpcsxcore/ppf.c:365:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(sbifile, "%s%s", Config.PatchesDir, buffer);
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:226:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	char system[4];
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:980:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
						ptmp += sprintf(ptmp, tmp2, (float)psxMu32(sp + n * 4)); n++; break;
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:984:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
						ptmp += sprintf(ptmp, tmp2, (double)psxMu32(sp + n * 4)); n++; break;
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:990:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
						ptmp += sprintf(ptmp, tmp2, (unsigned int)psxMu32(sp + n * 4)); n++; break;
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:992:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
						ptmp += sprintf(ptmp, tmp2, (unsigned char)psxMu32(sp + n * 4)); n++; break;
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:994:15:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
						ptmp += sprintf(ptmp, tmp2, (char*)PSXM(psxMu32(sp + n * 4))); n++; break;
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1640:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(FDesc[1 + mcd].name, Ra0+5); \
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1666:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(ptr+0xa, FDesc[1 + mcd].name); \
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1870:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(dir->name+i, ptr+i); break; } \
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1897:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(ffile, Ra0);
data/pcsxr-1.9.94/libpcsxcore/psxcommon.c:70:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(emuLog, fmt, list);
data/pcsxr-1.9.94/libpcsxcore/psxcommon.c:72:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf(tmp, fmt, list);
data/pcsxr-1.9.94/libpcsxcore/psxcounters.c:101:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        vsnprintf( buf, sizeof(buf), str, va );
data/pcsxr-1.9.94/libpcsxcore/psxmem.c:117:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(bios, "%s/%s", Config.BiosDir, Config.Bios);
data/pcsxr-1.9.94/libpcsxcore/socket.c:122:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(hello, "000 PCSXR Version %s - Debug console\r\n", PACKAGE_VERSION);
data/pcsxr-1.9.94/macosx/Plugin.c:73:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(dst, ptr+1); \
data/pcsxr-1.9.94/macosx/Plugin.c:106:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(info.EmuName, "PCSX " PACKAGE_VERSION);
data/pcsxr-1.9.94/macosx/Plugin.c:114:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(path, "%s%s", Config.BiosDir, Config.Bios);
data/pcsxr-1.9.94/macosx/Plugin.c:115:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(info.BIOSpath, path);
data/pcsxr-1.9.94/macosx/Plugin.c:116:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(info.MCD1path, Config.Mcd1);
data/pcsxr-1.9.94/macosx/Plugin.c:117:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(info.MCD2path, Config.Mcd2);
data/pcsxr-1.9.94/macosx/Plugin.c:118:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(path, "%s%s", Config.PluginsDir, Config.Gpu);
data/pcsxr-1.9.94/macosx/Plugin.c:119:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(info.GPUpath, path);
data/pcsxr-1.9.94/macosx/Plugin.c:120:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(path, "%s%s", Config.PluginsDir, Config.Spu);
data/pcsxr-1.9.94/macosx/Plugin.c:121:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(info.SPUpath, path);
data/pcsxr-1.9.94/macosx/Plugin.c:122:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(path, "%s%s", Config.PluginsDir, Config.Cdr);
data/pcsxr-1.9.94/macosx/Plugin.c:123:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(info.CDRpath, path);
data/pcsxr-1.9.94/macosx/Plugin.c:138:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(Config.Mcd1, info.MCD1path);
data/pcsxr-1.9.94/macosx/Plugin.c:139:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(Config.Mcd2, info.MCD2path);
data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:110:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(dev, psz_buf);
data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:137:37:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	if (dev != NULL && dev[0] != '\0') strcpy(cdDevice, dev);
data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:149:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(buf, KeyString[i].desc);
data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:176:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(buf, _("Joystick: Hat %d %s"), (g.cfg.PadDef[joynum].KeyDef[key].J.Hat >> 8),
data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:193:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(buf, keyboardBuf);
data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:210:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(buf, _("Joystick: Hat %d %s"), (g.cfg.PadDef[joynum].AnalogDef[analognum][dir].J.Hat >> 8),
data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:227:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(buf, keyboardBuf);
data/pcsxr-1.9.94/plugins/bladesio1/gui.c:65:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					strcpy(IPAddress, inet_ntoa(addr.sin_addr));
data/pcsxr-1.9.94/plugins/bladesio1/gui.c:84:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(IPAddress, inet_ntoa(*((struct in_addr *)host->h_addr_list[0])));
data/pcsxr-1.9.94/plugins/bladesio1/gui.c:96:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf(msg, fmt, list);
data/pcsxr-1.9.94/plugins/bladesio1/sio1.c:558:5:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				execl(cfg, "cfgBladeSio1", arg, NULL);
data/pcsxr-1.9.94/plugins/bladesio1/sio1.c:572:5:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				execl(cfg, "cfgBladeSio1", arg, NULL);
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:480:5:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				execl(cfg, "cfgDFCdrom", arg, NULL);
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:494:5:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				execl(cfg, "cfgDFCdrom", arg, NULL);
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:220:16:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define PRINTF printf
data/pcsxr-1.9.94/plugins/dfcdrom/cdrcfg-0.1df/main.c:131:7:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	fp = popen("eject -l", "r");
data/pcsxr-1.9.94/plugins/dfcdrom/cdrcfg-0.1df/main.c:143:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(cdrom_devices[i++], devname);
data/pcsxr-1.9.94/plugins/dfcdrom/cfg.c:38:6:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	f = popen("eject -l", "r");
data/pcsxr-1.9.94/plugins/dfcdrom/cfg.c:50:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(CdromDev, devname);
data/pcsxr-1.9.94/plugins/dfcdrom/cfg.c:58:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(CdromDev, DEV_DEF);
data/pcsxr-1.9.94/plugins/dfcdrom/cfg.c:70:2:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	fscanf(f, "CdromDev = %s\n", CdromDev);
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:137:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(buf, _("Joystick: Hat %d %s"), (keydef->J.Hat >> 8),
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:154:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(buf, XKeysymToString(keydef->Key));
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:176:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(buf, _("Joystick: Hat %d %s"), (g.cfg.PadDef[joynum].AnalogDef[analognum][dir].J.Hat >> 8),
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:193:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(buf, XKeysymToString(g.cfg.PadDef[joynum].AnalogDef[analognum][dir].Key));
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:610:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(buf, "%d: %s", j + 1, SDL_JoystickName(j));
data/pcsxr-1.9.94/plugins/dfinput/pad.c:662:4:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			execl("cfg/cfgDFInput", "cfgDFInput", "configure", NULL);
data/pcsxr-1.9.94/plugins/dfinput/pad.c:677:4:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			execl("cfg/cfgDFInput", "cfgDFInput", "about", NULL);
data/pcsxr-1.9.94/plugins/dfinput/xkb.c:50:20:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        if (pclose(popen(buf, "r")) == 0) {
data/pcsxr-1.9.94/plugins/dfinput/xkb.c:83:25:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        FILE *phandle = popen(buf, "r");
data/pcsxr-1.9.94/plugins/dfnet/gui.c:24:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf(msg, fmt, list);
data/pcsxr-1.9.94/plugins/dfnet/gui.c:64:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					strcpy(IPAddress, inet_ntoa(addr.sin_addr));
data/pcsxr-1.9.94/plugins/dfnet/gui.c:83:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(IPAddress, inet_ntoa(*((struct in_addr *)host->h_addr_list[0])));
data/pcsxr-1.9.94/plugins/dfnet/gui.c:135:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(conf.ipAddress, gtk_entry_get_text(GTK_ENTRY(widget)));
data/pcsxr-1.9.94/plugins/dfnet/gui.c:199:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(msg, *args); strcat(msg, " ");
data/pcsxr-1.9.94/plugins/dfnet/unix.c:27:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(cfg, arg);
data/pcsxr-1.9.94/plugins/dfnet/unix.c:30:22:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		if (fork() == 0) { system(cfg); exit(0); }
data/pcsxr-1.9.94/plugins/dfnet/unix.c:34:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	return system(cfg);
data/pcsxr-1.9.94/plugins/dfnet/unix.c:71:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf(msg, fmt, list);
data/pcsxr-1.9.94/plugins/dfnet/unix.c:74:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cmd, "message %s\n", msg);
data/pcsxr-1.9.94/plugins/dfnet/unix.c:105:3:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		execl("cfg/cfgDFNet", "cfgDFNet", "wait", NULL);
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:50:8:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
       execl("./cfgDFSound","cfgDFSound",pCmdLine,NULL);
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:78:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
     sprintf(t,"%s/dfsound.cfg",getenv("HOME")); 
data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:108:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(cfg, CONFIG_FILENAME);
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:65:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  size+=sprintf(pB+size, "%s = %d\n", name, var); \
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:80:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  size+=sprintf(pB+size, "%s = %.1f\n", name, (double)var); \
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:90:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(t,pConfigFile);
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:99:14:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
     if(!in) sprintf(t,"%s/.pcsxr/plugins/dfxvideo.cfg",getenv("HOME"));
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:178:5:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				execl(cfg, "cfgDFXVideo", arg, NULL);
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:192:5:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				execl(cfg, "cfgDFXVideo", arg, NULL);
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:201:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cfg, "%s/.pcsxr/plugins/cfg/cfgDFXVideo", getenv("HOME"));
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:206:5:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				execl(cfg, "cfgDFXVideo", arg, NULL);
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:262:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(t,pConfigFile);
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:271:15:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
     if(!out) sprintf(t,"%s/.pcsxr/plugins/dfxvideo.cfg",getenv("HOME"));
data/pcsxr-1.9.94/plugins/dfxvideo/draw.c:1653:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(szDispBuf,szDebugText);
data/pcsxr-1.9.94/plugins/dfxvideo/draw.c:1658:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(szDispBuf,szMenuBuf);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:215:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
 strcpy(szDebugText,pText);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:263:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"Plugin: %s %d.%d.%d\r\n",libraryName,version,revision,build);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:264:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:265:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"Author: %s\r\n\r\n",PluginAuthor);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:266:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:272:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:280:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:283:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:285:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:287:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"Framerate:\r\n- FPS limit: %s\r\n",szO[UseFrameLimit]);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:288:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:289:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"- Frame skipping: %s",szO[UseFrameSkip]);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:290:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:296:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:304:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:306:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"- Game fixes: %s [%08x]\r\n",szO[iUseFixes],dwCfgFixes);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:307:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:321:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"%s/pcsxr%04d.txt",getenv("HOME"),iNum);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:383:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(filename, "%s/pcsxr%04ld.bmp", getenv("HOME"), snapshotnr);
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:159:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(cfg, CONFIG_FILENAME);
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:355:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(pC,p);
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:356:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(ps,t);
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:357:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(pB,pC);
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:362:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(pB,pE);
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:364:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(pB,t);
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:380:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cfg, CONFIG_FILENAME);
data/pcsxr-1.9.94/plugins/dfxvideo/menu.c:90:4:  [4] (buffer) lstrcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
   lstrcat(szDispBuf,szMenuBuf);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:229:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"Plugin: %s %d.%d.%d (mod)\r\n",libraryName,version,revision,build);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:230:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:231:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"Author: %s\r\n",PluginAuthor);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:232:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:244:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"Card vendor: %s\r\n",(char *)glGetString(GL_VENDOR));
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:245:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:246:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"GFX card: %s\r\n",(char *)glGetString(GL_RENDERER));
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:247:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:248:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"OGL version: %s\r\n\r\n",(char *)glGetString(GL_VERSION));
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:249:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:267:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:272:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:276:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:278:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 if(iForceVSync>=0) sprintf(szTxt,"- V-Sync: %s\r\n",szO[iForceVSync]);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:280:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt); 
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:281:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"- Keep psx aspect ratio: %s\r\n\r\n",szO[bKeepRatio]);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:282:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:292:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:300:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:302:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt); 
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:305:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(szTxt,"- Palettized tex windows: %s\r\n",szO[iUsePalTextures]);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:306:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(pB,szTxt); 
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:312:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:314:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"Framerate:\r\n- FPS limitation: %s\r\n",szO[bUseFrameLimit]);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:315:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:316:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"- Frame skipping: %s\r\n",szO[bUseFrameSkip]);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:317:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:321:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:324:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:332:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:334:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:335:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"- Alpha multipass: %s\r\n",szO[bOpaquePass]);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:336:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:337:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"- Mask bit: %s\r\n",szO[iUseMask]);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:338:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:339:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"- Advanced blending: %s",szO[bAdvancedBlend]);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:346:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:361:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);             
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:363:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"Misc:\r\n- Scanlines: %s",szO[iUseScanLines]);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:364:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:367:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:368:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"- Line mode: %s\r\n",szO[bUseLines]);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:369:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:372:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"- Unfiltered FB: %s\r\n",szO[bUseFastMdec]);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:373:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:374:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"- 15 bit FB: %s\r\n",szO[bUse15bitMdec]);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:375:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:376:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"- Dithering: %s\r\n",szO[bDrawDither]);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:377:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:378:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"- Screen smoothing: %s",szO[iBlurBuffer]);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:379:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:386:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"- Game fixes: %s [%08x]\r\n",szO[bUseFixes],dwCfgFixes);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:387:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
 strcat(pB,szTxt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:403:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(szTxt,"%s/pcsxr%04d.txt",getenv("HOME"),iNum);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:472:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(filename,"%s/pcsxr%04d.bmp",getenv("HOME"),snapshotnr);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3023:5:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				execl(cfg, "cfgpeopsxgl", arg, NULL);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3037:5:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				execl(cfg, "cfgpeopsxgl", arg, NULL);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3046:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cfg, "%s/.pcsxr/plugins/cfg/cfgpeopsxgl", getenv("HOME"));
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3051:5:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
				execl(cfg, "cfgpeopsxgl", arg, NULL);
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:79:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(szCode, szDescr);
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:728:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							strcpy(p, buf);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:100:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(text, "LANGUAGE=%s", Conf->Lang);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:157:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(lp, "%s", FindData.cFileName); \
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:182:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(tmpStr, Config.PluginsDir);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:188:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tmpStr,"%s%s", Config.PluginsDir, FindData.cFileName);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:199:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(tmpStr, "%s %d.%d", PSE_GetLibName(), (int)(version>>8)&0xff, (int)version&0xff);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:245:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(tmpStr, Config.BiosDir);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:255:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(lp, "%s", (char *)FindData.cFileName);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:260:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(Config.Bios, FindData.cFileName);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:340:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(Config.Bios, biosFILE);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:341:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(Config.Gpu,  gpuDLL);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:342:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(Config.Spu,  spuDLL);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:344:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(Config.Cdr,  cdrDLL);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:347:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(Config.Pad1, pad1DLL);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:348:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(Config.Pad2, pad2DLL);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:350:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(Config.Sio1, sio1DLL);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:370:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(file, Config.PluginsDir); \
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:371:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(file, pDLL); \
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:446:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(file, Config.PluginsDir); \
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:447:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(file, pDLL); \
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:519:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(Config.PluginsDir, Path);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:528:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(Config.BiosDir, Path);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:632:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(tmpStr, Config.PluginsDir);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:644:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(tmpStr,"%s%s", Config.PluginsDir, FindData.cFileName);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:655:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
					sprintf(tmpStr, "%s %d.%d", PSE_GetLibName(), (int)(version>>8)&0xff, (int)version&0xff);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:699:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					strcpy(Config.Net, GetSelDLL(hW, IDC_LISTNET));
data/pcsxr-1.9.94/win32/gui/WndMain.c:118:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(Config.Lang, sLangs[i].id);
data/pcsxr-1.9.94/win32/gui/WndMain.c:131:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(dst + len, src);
data/pcsxr-1.9.94/win32/gui/WndMain.c:168:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(text, "LANGUAGE=%s", Config.Lang);
data/pcsxr-1.9.94/win32/gui/WndMain.c:204:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					if (arg != NULL) strcpy(cdfile, arg);
data/pcsxr-1.9.94/win32/gui/WndMain.c:206:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					strcpy(cdfile, arg);
data/pcsxr-1.9.94/win32/gui/WndMain.c:378:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			 sprintf(Text, _("*PCSXR*: Loaded State %s"), szFileName);
data/pcsxr-1.9.94/win32/gui/WndMain.c:379:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		else sprintf(Text, _("*PCSXR*: Error Loading State %s"), szFileName);
data/pcsxr-1.9.94/win32/gui/WndMain.c:424:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			 sprintf(Text, _("*PCSXR*: Saved State %s"), szFileName);
data/pcsxr-1.9.94/win32/gui/WndMain.c:425:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		else sprintf(Text, _("*PCSXR*: Error Saving State %s"), szFileName);
data/pcsxr-1.9.94/win32/gui/WndMain.c:1562:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(file, szFileName);
data/pcsxr-1.9.94/win32/gui/WndMain.c:1605:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(file, szFileName);
data/pcsxr-1.9.94/win32/gui/WndMain.c:1627:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(buf, string); \
data/pcsxr-1.9.94/win32/gui/WndMain.c:1635:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(buf, string); \
data/pcsxr-1.9.94/win32/gui/WndMain.c:1710:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(langs[i].lang, lang);
data/pcsxr-1.9.94/win32/gui/WndMain.c:1823:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(Config.Lang, lang);
data/pcsxr-1.9.94/win32/gui/WndMain.c:1875:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf(msg,fmt,list);
data/pcsxr-1.9.94/win32/gui/WndMain.c:1891:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf(tmp,fmt,list);
data/pcsxr-1.9.94/win32/gui/plugin.c:210:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(dst, ptr+1); \
data/pcsxr-1.9.94/win32/gui/plugin.c:226:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(info.EmuName, "PCSXR " PACKAGE_VERSION);
data/pcsxr-1.9.94/win32/gui/plugin.c:234:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(path, "%s%s", Config.BiosDir, Config.Bios);
data/pcsxr-1.9.94/win32/gui/plugin.c:235:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(info.BIOSpath, path);
data/pcsxr-1.9.94/win32/gui/plugin.c:236:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(info.MCD1path, Config.Mcd1);
data/pcsxr-1.9.94/win32/gui/plugin.c:237:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(info.MCD2path, Config.Mcd2);
data/pcsxr-1.9.94/win32/gui/plugin.c:238:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(path, "%s%s", Config.PluginsDir, Config.Gpu);
data/pcsxr-1.9.94/win32/gui/plugin.c:239:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(info.GPUpath, path);
data/pcsxr-1.9.94/win32/gui/plugin.c:240:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(path, "%s%s", Config.PluginsDir, Config.Spu);
data/pcsxr-1.9.94/win32/gui/plugin.c:241:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(info.SPUpath, path);
data/pcsxr-1.9.94/win32/gui/plugin.c:242:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(path, "%s%s", Config.PluginsDir, Config.Cdr);
data/pcsxr-1.9.94/win32/gui/plugin.c:243:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(info.CDRpath, path);
data/pcsxr-1.9.94/win32/gui/plugin.c:258:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(Config.Mcd1, info.MCD1path);
data/pcsxr-1.9.94/win32/gui/plugin.c:259:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(Config.Mcd2, info.MCD2path);
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:636:2:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
 lstrcpy(szGPUKeys,szKeyDefaults);
data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c:633:2:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
 lstrcpy(szGPUKeys,szKeyDefaults);
data/pcsxr-1.9.94/win32/zlib/gzio.c:112:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(s->path, path); /* do this early for debugging */
data/pcsxr-1.9.94/win32/zlib/gzio.c:537:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    (void)vsnprintf(buf, sizeof(buf), format, va);
data/pcsxr-1.9.94/win32/zlib/gzio.c:539:11:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    (void)vsprintf(buf, format, va);
data/pcsxr-1.9.94/win32/zlib/gzio.c:560:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(buf, sizeof(buf), format, a1, a2, a3, a4, a5, a6, a7, a8,
data/pcsxr-1.9.94/win32/zlib/gzio.c:563:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, format, a1, a2, a3, a4, a5, a6, a7, a8,
data/pcsxr-1.9.94/win32/zlib/gzio.c:875:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(s->msg, s->path);
data/pcsxr-1.9.94/win32/zlib/gzio.c:877:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(s->msg, m);
data/pcsxr-1.9.94/win32/zlib/zutil.h:195:39:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Trace(x) {if (z_verbose>=0) fprintf x ;}
data/pcsxr-1.9.94/win32/zlib/zutil.h:196:39:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracev(x) {if (z_verbose>0) fprintf x ;}
data/pcsxr-1.9.94/win32/zlib/zutil.h:197:40:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracevv(x) {if (z_verbose>1) fprintf x ;}
data/pcsxr-1.9.94/win32/zlib/zutil.h:198:48:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracec(c,x) {if (z_verbose>0 && (c)) fprintf x ;}
data/pcsxr-1.9.94/win32/zlib/zutil.h:199:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define Tracecv(c,x) {if (z_verbose>1 && (c)) fprintf x ;}
data/pcsxr-1.9.94/gui/Cheat.c:317:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	filename = g_build_filename(getenv("HOME"), CHEATS_DIR, NULL);
data/pcsxr-1.9.94/gui/Cheat.c:361:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	filename = g_build_filename(getenv("HOME"), CHEATS_DIR, NULL);
data/pcsxr-1.9.94/gui/ConfDlg.c:389:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		filename = g_build_filename (getenv("HOME"), PLUGINS_DIR, plugin, NULL); \
data/pcsxr-1.9.94/gui/ConfDlg.c:586:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	pluginfile = g_strconcat(getenv("HOME"), PLUGINS_DIR, plugin, NULL);
data/pcsxr-1.9.94/gui/Config.c:84:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	strncpy(cfgfile, getenv("HOME"), 200);
data/pcsxr-1.9.94/gui/DebugMemory.c:202:72:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			gtk_file_chooser_set_current_folder(GTK_FILE_CHOOSER(file_chooser), getenv("HOME"));
data/pcsxr-1.9.94/gui/GtkGui.c:219:37:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	state_filename = g_build_filename (getenv("HOME"), STATES_DIR, SStateFile, NULL);
data/pcsxr-1.9.94/gui/GtkGui.c:268:48:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	gchar *defaultChtFilePath = g_build_filename (getenv("HOME"), CHEATS_DIR, chtfile, NULL);
data/pcsxr-1.9.94/gui/GtkGui.c:550:71:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		gtk_file_chooser_set_current_folder(GTK_FILE_CHOOSER(file_chooser), getenv("HOME"));
data/pcsxr-1.9.94/gui/GtkGui.c:672:26:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		strcpy(current_folder, getenv("HOME"));
data/pcsxr-1.9.94/gui/GtkGui.c:886:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	dotdir = g_build_filename(getenv("HOME"), PLUGINS_DIR, NULL);
data/pcsxr-1.9.94/gui/GtkGui.c:1017:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	SStateFile = g_strconcat(getenv("HOME"), STATES_DIR, NULL);
data/pcsxr-1.9.94/gui/GtkGui.c:1045:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	SStateFile = g_strconcat (getenv("HOME"), STATES_DIR, NULL);
data/pcsxr-1.9.94/gui/LnxMain.c:56:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	mcd = g_build_filename(getenv("HOME"), MEMCARD_DIR, filename, NULL);
data/pcsxr-1.9.94/gui/LnxMain.c:74:39:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		gchar *dir_name = g_build_filename (getenv("HOME"), directory, NULL);
data/pcsxr-1.9.94/gui/LnxMain.c:113:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
				linkname = g_build_filename (getenv("HOME"), PLUGINS_DIR, ent->d_name, NULL);
data/pcsxr-1.9.94/gui/LnxMain.c:120:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
					linkname = g_build_filename (getenv("HOME"), PLUGINS_CFG_DIR, ent->d_name, NULL);
data/pcsxr-1.9.94/gui/LnxMain.c:151:33:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
				linkname = g_build_filename(getenv("HOME"), BIOS_DIR, ent->d_name, NULL);
data/pcsxr-1.9.94/gui/LnxMain.c:243:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	currentdir = g_strconcat(getenv("HOME"), "/.psemu-plugins/", NULL);
data/pcsxr-1.9.94/gui/LnxMain.c:247:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	currentdir = g_strconcat(getenv("HOME"), "/.psemu/", NULL);
data/pcsxr-1.9.94/gui/LnxMain.c:252:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	currentdir = g_build_filename(getenv("HOME"), PLUGINS_DIR, NULL);
data/pcsxr-1.9.94/gui/LnxMain.c:257:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	currentdir = g_build_filename(getenv("HOME"), PLUGINS_CFG_DIR, NULL);
data/pcsxr-1.9.94/gui/LnxMain.c:262:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	currentdir = g_build_filename(getenv("HOME"), BIOS_DIR, NULL);
data/pcsxr-1.9.94/gui/LnxMain.c:376:37:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		gchar *str_bios_dir = g_strconcat(getenv("HOME"), BIOS_DIR, NULL);
data/pcsxr-1.9.94/gui/LnxMain.c:380:39:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		gchar *str_plugin_dir = g_strconcat(getenv("HOME"), PLUGINS_DIR, NULL);
data/pcsxr-1.9.94/gui/LnxMain.c:407:39:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	gchar *str_patches_dir = g_strconcat(getenv("HOME"), PATCHES_DIR, NULL);
data/pcsxr-1.9.94/gui/LnxMain.c:413:47:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	gchar *plugin_default_dir = g_build_filename(getenv("HOME"), PLUGINS_DIR, NULL);
data/pcsxr-1.9.94/gui/MemcardDlg.c:379:26:  [3] (buffer) g_get_home_dir:
  This function is synonymous with 'getenv("HOME")';it returns untrustable
  input if the environment can beset by an attacker. It can have any content
  and length, and the same variable can be set more than once (CWE-807,
  CWE-20). Check environment variables carefully before using them.
	path = g_build_filename(g_get_home_dir(), ".pcsxr", "memcards", NULL);
data/pcsxr-1.9.94/gui/MemcardDlg.c:677:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		str = g_strconcat(getenv("HOME"), DEFAULT_MEM_CARD_1, NULL);
data/pcsxr-1.9.94/gui/MemcardDlg.c:683:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		str = g_strconcat(getenv("HOME"), DEFAULT_MEM_CARD_2, NULL);
data/pcsxr-1.9.94/gui/Plugin.c:365:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		strncpy(dotdir, getenv("HOME"), MAXPATHLEN-100);
data/pcsxr-1.9.94/plugins/dfinput/pad.c:260:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	sdlj = getenv("SDL_JOYSTICK_DEVICE");
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:78:33:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
     sprintf(t,"%s/dfsound.cfg",getenv("HOME")); 
data/pcsxr-1.9.94/plugins/dfsound/stdafx.h:51:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
#define RRand(range) (random()%range)  
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:99:57:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
     if(!in) sprintf(t,"%s/.pcsxr/plugins/dfxvideo.cfg",getenv("HOME"));
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:201:52:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	sprintf(cfg, "%s/.pcsxr/plugins/cfg/cfgDFXVideo", getenv("HOME"));
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:271:58:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
     if(!out) sprintf(t,"%s/.pcsxr/plugins/dfxvideo.cfg",getenv("HOME"));
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:165:22:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	kernel32LibHandle = LoadLibrary("kernel32.dll");
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:321:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
 sprintf(szTxt,"%s/pcsxr%04d.txt",getenv("HOME"),iNum);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:383:43:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   sprintf(filename, "%s/pcsxr%04ld.bmp", getenv("HOME"), snapshotnr);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:403:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
 sprintf(szTxt,"%s/pcsxr%04d.txt",getenv("HOME"),iNum);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:472:40:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   sprintf(filename,"%s/pcsxr%04d.bmp",getenv("HOME"),snapshotnr);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:801:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
 glxfx=getenv("MESA_GLX_FX");                          // 3dfx mesa fullscreen flag
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3046:52:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	sprintf(cfg, "%s/.pcsxr/plugins/cfg/cfgpeopsxgl", getenv("HOME"));
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3577:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
 srand(timeGetTime());                                 // init rand (will be used in BufferSwap)
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:189:10:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
			Lib = LoadLibrary(tmpStr);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:645:10:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
			Lib = LoadLibrary(tmpStr);
data/pcsxr-1.9.94/win32/gui/WndMain.c:1900:9:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	return LoadLibrary(lib);
data/pcsxr-1.9.94/win32/intl/dcgettext.c:50:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
char *getenv ();
data/pcsxr-1.9.94/win32/intl/dcgettext.c:97:7:  [3] (buffer) getwd:
  This does not protect against buffer overflows by itself, so use with
  caution (CWE-120, CWE-20). Use getcwd instead.
char *getwd ();
data/pcsxr-1.9.94/win32/intl/dcgettext.c:98:28:  [3] (buffer) getwd:
  This does not protect against buffer overflows by itself, so use with
  caution (CWE-120, CWE-20). Use getcwd instead.
#  define getcwd(buf, max) getwd (buf)
data/pcsxr-1.9.94/win32/intl/dcgettext.c:550:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  retval = getenv ("LANGUAGE");
data/pcsxr-1.9.94/win32/intl/dcgettext.c:561:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  retval = getenv ("LC_ALL");
data/pcsxr-1.9.94/win32/intl/dcgettext.c:566:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  retval = getenv (categoryname);
data/pcsxr-1.9.94/win32/intl/dcgettext.c:571:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  retval = getenv ("LANG");
data/pcsxr-1.9.94/win32/intl/localealias.c:45:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
char *getenv ();
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/winmain.c:31:16:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
			hDDrawDLL = LoadLibrary(TEXT("DDRAW.DLL"));
data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/ssave.c:46:16:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
   hKernel32 = LoadLibrary("kernel32.dll");
data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/ssave.c:56:16:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
   hKernel32 = LoadLibrary("kernel32.dll");
data/pcsxr-1.9.94/gui/Cheat.c:168:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[8192];
data/pcsxr-1.9.94/gui/Cheat.c:209:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(p, "%.8X %.4X\n", CheatCodes[i].Addr, CheatCodes[i].Val);
data/pcsxr-1.9.94/gui/Cheat.c:293:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int i = atoi(path_str);
data/pcsxr-1.9.94/gui/Cheat.c:518:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buf[256];
data/pcsxr-1.9.94/gui/Cheat.c:532:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf, "%u", current_valuefrom);
data/pcsxr-1.9.94/gui/Cheat.c:534:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf, "%u", current_valueto);
data/pcsxr-1.9.94/gui/Cheat.c:538:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf, "%X", current_valuefrom);
data/pcsxr-1.9.94/gui/Cheat.c:540:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf, "%X", current_valueto);
data/pcsxr-1.9.94/gui/Cheat.c:586:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
						sprintf(buf, _("%.8X    Current: %u (%.2X), Previous: %u (%.2X)"),
data/pcsxr-1.9.94/gui/Cheat.c:591:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
						sprintf(buf, _("%.8X    Current: %u (%.4X), Previous: %u (%.4X)"),
data/pcsxr-1.9.94/gui/Cheat.c:596:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
						sprintf(buf, _("%.8X    Current: %u (%.8X), Previous: %u (%.8X)"),
data/pcsxr-1.9.94/gui/Cheat.c:611:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf, _("Founded Addresses: %d"), NumSearchResults);
data/pcsxr-1.9.94/gui/Cheat.c:656:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buf[256];
data/pcsxr-1.9.94/gui/Cheat.c:704:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%u", val);
data/pcsxr-1.9.94/gui/Cheat.c:707:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%.8X", addr);
data/pcsxr-1.9.94/gui/Cheat.c:722:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(buf, "%.8X %.4X", (addr & 0x1FFFFF) | (CHEAT_CONST8 << 24), val);
data/pcsxr-1.9.94/gui/Cheat.c:729:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(buf, "%.8X %.4X", (addr & 0x1FFFFF) | (CHEAT_CONST16 << 24), val);
data/pcsxr-1.9.94/gui/Cheat.c:733:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(buf, "%.8X %.4X\n%.8X %.4X",
data/pcsxr-1.9.94/gui/Cheat.c:755:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buf[256];
data/pcsxr-1.9.94/gui/Cheat.c:794:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%u", val);
data/pcsxr-1.9.94/gui/Cheat.c:837:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[9];
data/pcsxr-1.9.94/gui/Cheat.c:842:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%8X", SearchResults[i]);
data/pcsxr-1.9.94/gui/Cheat.c:1091:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buf[256];
data/pcsxr-1.9.94/gui/Cheat.c:1096:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf, "%u", val);
data/pcsxr-1.9.94/gui/Cheat.c:1101:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf, "%u", val);
data/pcsxr-1.9.94/gui/Cheat.c:1107:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf, "%X", val);
data/pcsxr-1.9.94/gui/Cheat.c:1112:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf, "%X", val);
data/pcsxr-1.9.94/gui/ConfDlg.c:85:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		strcpy(conf, (char *)list[row * 2]); \
data/pcsxr-1.9.94/gui/ConfDlg.c:243:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Plugin[MAXPATHLEN];
data/pcsxr-1.9.94/gui/ConfDlg.c:264:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Plugin[MAXPATHLEN];
data/pcsxr-1.9.94/gui/ConfDlg.c:285:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Plugin[MAXPATHLEN];
data/pcsxr-1.9.94/gui/ConfDlg.c:306:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Plugin[MAXPATHLEN];
data/pcsxr-1.9.94/gui/ConfDlg.c:327:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Plugin[MAXPATHLEN];
data/pcsxr-1.9.94/gui/ConfDlg.c:664:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[256];
data/pcsxr-1.9.94/gui/ConfDlg.c:734:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char ver[32];
data/pcsxr-1.9.94/gui/ConfDlg.c:737:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(ver, " %ld.%ld.%ld", v >> 16, (v >> 8) & 0xff, v & 0xff);
data/pcsxr-1.9.94/gui/ConfDlg.c:789:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char plugin[MAXPATHLEN],name[MAXPATHLEN];
data/pcsxr-1.9.94/gui/ConfDlg.c:795:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(NetConfS.plist[NetConfS.plugins - 1], "Disabled");
data/pcsxr-1.9.94/gui/ConfDlg.c:796:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(NetConfS.plist[NetConfS.plugins - 2], "Disabled");
data/pcsxr-1.9.94/gui/ConfDlg.c:826:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char ver[32];
data/pcsxr-1.9.94/gui/ConfDlg.c:829:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(ver, " %ld.%ld.%ld",v>>16,(v>>8)&0xff,v&0xff);
data/pcsxr-1.9.94/gui/ConfDlg.h:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char plist[255][255];	/* TODO Comment this out */
data/pcsxr-1.9.94/gui/Config.c:50:28:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (*tmp != '\n') return atol(tmp);
data/pcsxr-1.9.94/gui/Config.c:60:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (*tmp != '\n') return (atoi(tmp) != 0);
data/pcsxr-1.9.94/gui/Config.c:102:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(cfgfile, "r");
data/pcsxr-1.9.94/gui/Config.c:156:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(cfgfile, "w");
data/pcsxr-1.9.94/gui/DebugMemory.c:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buftext[20];
data/pcsxr-1.9.94/gui/DebugMemory.c:35:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buftext, "%.8X", MemViewAddress | 0x80000000);
data/pcsxr-1.9.94/gui/DebugMemory.c:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bufaddr[9], bufdata[16][3], buftext[17];
data/pcsxr-1.9.94/gui/DebugMemory.c:68:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(bufaddr, "%.8X", start | 0x80000000);
data/pcsxr-1.9.94/gui/DebugMemory.c:72:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(bufdata[i], "%.2X", (u8)buftext[i]);
data/pcsxr-1.9.94/gui/DebugMemory.c:150:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[10];
data/pcsxr-1.9.94/gui/DebugMemory.c:166:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%.8X", MemViewAddress | 0x80000000);
data/pcsxr-1.9.94/gui/DebugMemory.c:206:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				FILE *fp = fopen(file, "wb");
data/pcsxr-1.9.94/gui/DebugMemory.c:228:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[12];
data/pcsxr-1.9.94/gui/DebugMemory.c:244:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%.8X", MemViewAddress | 0x80000000);
data/pcsxr-1.9.94/gui/DebugMemory.c:254:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%.2X", MemViewValue);
data/pcsxr-1.9.94/gui/DebugMemory.c:330:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[2];
data/pcsxr-1.9.94/gui/GtkGui.c:213:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SStateFile[64];
data/pcsxr-1.9.94/gui/GtkGui.c:218:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(SStateFile, "%.32s-%.9s.%3.3d", trimlabel, CdromId, i);
data/pcsxr-1.9.94/gui/GtkGui.c:227:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char trimlabel[33];
data/pcsxr-1.9.94/gui/GtkGui.c:245:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[lblmax];
data/pcsxr-1.9.94/gui/GtkGui.c:662:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char current_folder[MAXPATHLEN] = "";
data/pcsxr-1.9.94/gui/GtkGui.c:916:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Text[MAXPATHLEN + 20];
data/pcsxr-1.9.94/gui/GtkGui.c:920:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(state_filename, "rb");
data/pcsxr-1.9.94/gui/GtkGui.c:962:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Text[MAXPATHLEN + 20];
data/pcsxr-1.9.94/gui/GtkGui.c:1076:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[512];
data/pcsxr-1.9.94/gui/Linux.h:42:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cfgfile[MAXPATHLEN];	/* ADB Comment this out - make a local var, or at least use gchar funcs */
data/pcsxr-1.9.94/gui/Linux.h:43:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cfgfile_basename[MAXPATHLEN];	/* ADB Comment this out - make a local var, or at least use gchar funcs */
data/pcsxr-1.9.94/gui/LnxMain.c:277:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char file[MAXPATHLEN] = "";
data/pcsxr-1.9.94/gui/LnxMain.c:278:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[MAXPATHLEN];
data/pcsxr-1.9.94/gui/LnxMain.c:294:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(cfgfile_basename, "pcsxr.cfg");
data/pcsxr-1.9.94/gui/LnxMain.c:302:48:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		else if (!strcmp(argv[i], "-load")) loadst = atol(argv[++i]);
data/pcsxr-1.9.94/gui/LnxMain.c:309:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char isofilename[MAXPATHLEN];
data/pcsxr-1.9.94/gui/LnxMain.c:358:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(Config.Net, "Disabled");
data/pcsxr-1.9.94/gui/LnxMain.c:469:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	emuLog = fopen("emuLog.txt","wb");
data/pcsxr-1.9.94/gui/LnxMain.c:515:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[512];
data/pcsxr-1.9.94/gui/MemcardDlg.c:447:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(to + (dsti + 1) * 128, from + (srci + 1) * 128, 128);
data/pcsxr-1.9.94/gui/MemcardDlg.c:451:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(to + (dsti + 1) * 1024 * 8, from + (srci+1) * 1024 * 8, 1024 * 8);
data/pcsxr-1.9.94/gui/Plugin.c:68:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(pMem, NoPic_Image.pixel_data, 128*96*3);
data/pcsxr-1.9.94/gui/Plugin.c:111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Text[MAXPATHLEN];
data/pcsxr-1.9.94/gui/Plugin.c:253:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(Text, _("SIO IRQ Always Enabled"));
data/pcsxr-1.9.94/gui/Plugin.c:254:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			else sprintf(Text, _("SIO IRQ Not Always Enabled"));
data/pcsxr-1.9.94/gui/Plugin.c:260:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(Text, _("Black & White Mdecs Only Enabled"));
data/pcsxr-1.9.94/gui/Plugin.c:261:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			else sprintf(Text, _("Black & White Mdecs Only Disabled"));
data/pcsxr-1.9.94/gui/Plugin.c:267:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf (Text, _("XA Enabled"));
data/pcsxr-1.9.94/gui/Plugin.c:268:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			else sprintf (Text, _("XA Disabled"));
data/pcsxr-1.9.94/gui/Plugin.c:362:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char path[MAXPATHLEN];
data/pcsxr-1.9.94/gui/Plugin.c:363:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char dotdir[MAXPATHLEN];
data/pcsxr-1.9.94/gui/Plugin.c:366:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(dotdir, "/.pcsxr/plugins/");
data/pcsxr-1.9.94/gui/nopic.h:11:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char cFont[10][120]=
data/pcsxr-1.9.94/gui/nopic.h:300:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char	 pixel_data[128 * 96 * 3 + 1];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:65:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char cdbuffer[CD_FRAMESIZE_RAW];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:66:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char subbuffer[SUB_FRAMESIZE];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:80:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buff_raw[16][CD_FRAMESIZE_RAW];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:81:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buff_compressed[CD_FRAMESIZE_RAW * 16 + 100];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:112:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filepath[256];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:140:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		msf[0] = atoi(token);
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:148:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		msf[1] = atoi(token);
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:156:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		msf[2] = atoi(token);
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:425:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tocname[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:427:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			linebuf[256], tmp[256], name[256];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:429:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			time[20], time2[20];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:439:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(tocname + strlen(tocname) - 4, ".toc");
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:445:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fi = fopen(tocname, "r")) == NULL) {
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:447:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(tocname + strlen(tocname) - 4, ".cue");
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:448:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if ((fi = fopen(tocname, "r")) == NULL) {
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:454:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				if ((fi = fopen(tocname, "r")) == NULL) {
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:562:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			cuename[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:563:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			filepath[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:567:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			time[20];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:569:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			linebuf[256], tmpb[256], dummy[256];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:580:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(cuename + strlen(cuename) - 4, ".cue");
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:586:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fi = fopen(cuename, "r")) == NULL) {
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:705:31:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			ti[numtracks + 1].handle = fopen(tmpb, "rb");
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:716:32:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				ti[numtracks + 1].handle = fopen(filepath, "rb");
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:740:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				cdHandle = fopen(filepath, "rb");
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:753:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ccdname[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:755:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			linebuf[256];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:764:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(ccdname + strlen(ccdname) - 4, ".ccd");
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:770:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fi = fopen(ccdname, "r")) == NULL) {
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:812:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			mdsname[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:823:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(mdsname + strlen(mdsname) - 4, ".mds");
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:829:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fi = fopen(mdsname, "rb")) == NULL) {
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:925:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char index0[3];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:927:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char index1[3];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:934:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char psar_sig[11];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1091:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char magic[4];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1097:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char rsv_06[2];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1168:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		subname[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1174:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(subname + strlen(subname) - 4, ".sub");
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1180:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	subHandle = fopen(subname, "rb");
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1189:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		sbiname[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1194:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(sbiname + strlen(sbiname) - 4, ".sbi");
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1317:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dest, compr_img->buff_raw[compr_img->sector_in_blk],
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1478:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dest, sector_buffer, CD_FRAMESIZE_RAW);
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1589:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	cdHandle = fopen(GetIsoFile(), "rb");
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1665:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		ti[1].handle = fopen(GetIsoFile(), "rb");
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1761:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char time[3];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1784:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char subQData[12];
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1795:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&subbuffer[12], subQData, 12);
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1878:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char msf[3] = {m, s, f};
data/pcsxr-1.9.94/libpcsxcore/cdrom.c:63:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *CmdName[0x100]= {
data/pcsxr-1.9.94/libpcsxcore/cdrom.c:382:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char start[3], next[3];
data/pcsxr-1.9.94/libpcsxcore/cdrom.c:430:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char tmp[3];
data/pcsxr-1.9.94/libpcsxcore/cdrom.c:446:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cdr.Prev, tmp, 3);
data/pcsxr-1.9.94/libpcsxcore/cdrom.c:457:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cdr.subq.Relative, subq->TrackRelativeAddress, 3);
data/pcsxr-1.9.94/libpcsxcore/cdrom.c:458:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cdr.subq.Absolute, subq->AbsoluteAddress, 3);
data/pcsxr-1.9.94/libpcsxcore/cdrom.c:562:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cdr.SetSectorPlay, cdr.SetSector, 4);
data/pcsxr-1.9.94/libpcsxcore/cdrom.c:664:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cdr.SetSectorPlay, cdr.SetSector, 4);
data/pcsxr-1.9.94/libpcsxcore/cdrom.c:847:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cdr.Result, cdr.Transfer, 8);
data/pcsxr-1.9.94/libpcsxcore/cdrom.c:852:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&cdr.Result, &cdr.subq, 8);
data/pcsxr-1.9.94/libpcsxcore/cdrom.c:923:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(cdr.Result, Test20, 4);
data/pcsxr-1.9.94/libpcsxcore/cdrom.c:927:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(cdr.Result, Test22, 4);
data/pcsxr-1.9.94/libpcsxcore/cdrom.c:931:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(cdr.Result, Test23, 4);
data/pcsxr-1.9.94/libpcsxcore/cdrom.c:994:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cdr.SetSectorPlay, cdr.SetSector, 4);
data/pcsxr-1.9.94/libpcsxcore/cdrom.c:1016:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(cdr.Transfer, buf, 8);
data/pcsxr-1.9.94/libpcsxcore/cdrom.c:1181:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cdr.Transfer, buf, DATA_SIZE);
data/pcsxr-1.9.94/libpcsxcore/cdrom.c:1336:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cdr.SetSector, set_loc, 3);
data/pcsxr-1.9.94/libpcsxcore/cdrom.c:1436:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&cdr.AttenuatorLeftToLeft, &cdr.AttenuatorLeftToLeftT, 4);
data/pcsxr-1.9.94/libpcsxcore/cdrom.c:1598:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tmpp, cdr.Prev, 3);
data/pcsxr-1.9.94/libpcsxcore/cdrom.h:55:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char Transfer[CD_FRAMESIZE_RAW];
data/pcsxr-1.9.94/libpcsxcore/cdrom.h:58:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char Prev[4];
data/pcsxr-1.9.94/libpcsxcore/cdrom.h:59:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char Param[8];
data/pcsxr-1.9.94/libpcsxcore/cdrom.h:60:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char Result[16];
data/pcsxr-1.9.94/libpcsxcore/cdrom.h:72:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char ResultTN[6];
data/pcsxr-1.9.94/libpcsxcore/cdrom.h:73:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char ResultTD[4];
data/pcsxr-1.9.94/libpcsxcore/cdrom.h:74:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char SetSectorPlay[4];
data/pcsxr-1.9.94/libpcsxcore/cdrom.h:75:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char SetSectorEnd[4];
data/pcsxr-1.9.94/libpcsxcore/cdrom.h:76:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char SetSector[4];
data/pcsxr-1.9.94/libpcsxcore/cdrom.h:108:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char Relative[3];
data/pcsxr-1.9.94/libpcsxcore/cdrom.h:109:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char Absolute[3];
data/pcsxr-1.9.94/libpcsxcore/cheat.c:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				buf[256];
data/pcsxr-1.9.94/libpcsxcore/cheat.c:70:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(filename, "r");
data/pcsxr-1.9.94/libpcsxcore/cheat.c:156:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(filename, "w");
data/pcsxr-1.9.94/libpcsxcore/cheat.c:470:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(prevM, psxM, 0x200000);
data/pcsxr-1.9.94/libpcsxcore/coff.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	s_name[8];      /* section name */
data/pcsxr-1.9.94/libpcsxcore/debug.c:398:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char reply[256];
data/pcsxr-1.9.94/libpcsxcore/debug.c:425:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmd[257], *arguments, *p, reply[10240], *save, *dump;
data/pcsxr-1.9.94/libpcsxcore/debug.c:462:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "202 1.0\r\n");
data/pcsxr-1.9.94/libpcsxcore/debug.c:465:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "203 %i\r\n", paused ? 1 : trace ? 2 : 0);
data/pcsxr-1.9.94/libpcsxcore/debug.c:468:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "210 PC=%08X\r\n", psxRegs.pc);
data/pcsxr-1.9.94/libpcsxcore/debug.c:484:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf(reply, "211 %02X(%2.2s)=%08X\r\n", code, disRNameGPR[code], psxRegs.GPR.r[code]);
data/pcsxr-1.9.94/libpcsxcore/debug.c:486:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf(reply, "511 Invalid GPR register: %X\r\n", code);
data/pcsxr-1.9.94/libpcsxcore/debug.c:491:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "212 LO=%08X HI=%08X\r\n", psxRegs.GPR.n.lo, psxRegs.GPR.n.hi);
data/pcsxr-1.9.94/libpcsxcore/debug.c:507:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf(reply, "213 %02X(%8.8s)=%08X\r\n", code, disRNameCP0[code], psxRegs.CP0.r[code]);
data/pcsxr-1.9.94/libpcsxcore/debug.c:509:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf(reply, "511 Invalid COP0 register: %X\r\n", code);
data/pcsxr-1.9.94/libpcsxcore/debug.c:527:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf(reply, "214 %02X(%6.6s)=%08X\r\n", code, disRNameCP2C[code], psxRegs.CP2C.r[code]);
data/pcsxr-1.9.94/libpcsxcore/debug.c:529:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf(reply, "511 Invalid COP2C register: %X\r\n", code);
data/pcsxr-1.9.94/libpcsxcore/debug.c:547:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf(reply, "215 %02X(%4.4s)=%08X\r\n", code, disRNameCP2D[code], psxRegs.CP2D.r[code]);
data/pcsxr-1.9.94/libpcsxcore/debug.c:549:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf(reply, "511 Invalid COP2D register: %X\r\n", code);
data/pcsxr-1.9.94/libpcsxcore/debug.c:573:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(reply, "221 %02X=%08X\r\n", reg, value);
data/pcsxr-1.9.94/libpcsxcore/debug.c:575:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(reply, "512 Invalid GPR register: %02X\r\n", reg);
data/pcsxr-1.9.94/libpcsxcore/debug.c:593:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(reply, "222 LO=%08X HI=%08X\r\n", psxRegs.GPR.n.lo, psxRegs.GPR.n.hi);
data/pcsxr-1.9.94/libpcsxcore/debug.c:604:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(reply, "223 %02X=%08X\r\n", reg, value);
data/pcsxr-1.9.94/libpcsxcore/debug.c:606:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(reply, "512 Invalid COP0 register: %02X\r\n", reg);
data/pcsxr-1.9.94/libpcsxcore/debug.c:617:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(reply, "224 %02X=%08X\r\n", reg, value);
data/pcsxr-1.9.94/libpcsxcore/debug.c:619:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(reply, "512 Invalid COP2C register: %02X\r\n", reg);
data/pcsxr-1.9.94/libpcsxcore/debug.c:630:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(reply, "225 %02X=%08X\r\n", reg, value);
data/pcsxr-1.9.94/libpcsxcore/debug.c:632:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(reply, "512 Invalid COP2D register: %02X\r\n", reg);
data/pcsxr-1.9.94/libpcsxcore/debug.c:642:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(reply, "230 %08X@%08X\r\n", size, address);
data/pcsxr-1.9.94/libpcsxcore/debug.c:656:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(reply, "240 %08X@%08X\r\n", size, address);
data/pcsxr-1.9.94/libpcsxcore/debug.c:895:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            sfile = fopen("flow.idc", "wb");
data/pcsxr-1.9.94/libpcsxcore/debug.c:905:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            sfile = fopen("markcode.idc", "wb");
data/pcsxr-1.9.94/libpcsxcore/debug.c:915:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "270 flow.idc and markcode.idc dumped\r\n");
data/pcsxr-1.9.94/libpcsxcore/debug.c:929:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf(reply, "530 No breakpoint\r\n");
data/pcsxr-1.9.94/libpcsxcore/debug.c:935:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf(reply, "530 Invalid breakpoint number: %X\r\n", code);
data/pcsxr-1.9.94/libpcsxcore/debug.c:946:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(reply, "401 All breakpoints deleted.\r\n");
data/pcsxr-1.9.94/libpcsxcore/debug.c:950:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf(reply, "401 Breakpoint %X deleted.\r\n", code);
data/pcsxr-1.9.94/libpcsxcore/debug.c:952:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf(reply, "530 Invalid breakpoint number: %X\r\n", code);
data/pcsxr-1.9.94/libpcsxcore/debug.c:966:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "410 %X\r\n", code);
data/pcsxr-1.9.94/libpcsxcore/debug.c:974:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(reply, "532 Invalid address %08X\r\n", address);
data/pcsxr-1.9.94/libpcsxcore/debug.c:978:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "420 %X\r\n", code);
data/pcsxr-1.9.94/libpcsxcore/debug.c:986:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(reply, "532 Invalid address %08X\r\n", address);
data/pcsxr-1.9.94/libpcsxcore/debug.c:990:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "421 %X\r\n", code);
data/pcsxr-1.9.94/libpcsxcore/debug.c:998:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(reply, "532 Invalid address %08X\r\n", address);
data/pcsxr-1.9.94/libpcsxcore/debug.c:1002:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "422 %X\r\n", code);
data/pcsxr-1.9.94/libpcsxcore/debug.c:1010:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(reply, "533 Invalid address %08X\r\n", address);
data/pcsxr-1.9.94/libpcsxcore/debug.c:1014:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "430 %X\r\n", code);
data/pcsxr-1.9.94/libpcsxcore/debug.c:1022:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(reply, "533 Invalid address %08X\r\n", address);
data/pcsxr-1.9.94/libpcsxcore/debug.c:1026:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "431 %X\r\n", code);
data/pcsxr-1.9.94/libpcsxcore/debug.c:1034:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(reply, "533 Invalid address %08X\r\n", address);
data/pcsxr-1.9.94/libpcsxcore/debug.c:1038:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "432 %X\r\n", code);
data/pcsxr-1.9.94/libpcsxcore/debug.c:1042:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "490 Paused\r\n");
data/pcsxr-1.9.94/libpcsxcore/debug.c:1046:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "491 Resumed\r\n");
data/pcsxr-1.9.94/libpcsxcore/debug.c:1057:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "495 Tracing\r\n");
data/pcsxr-1.9.94/libpcsxcore/debug.c:1073:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "498 Soft resetting\r\n");
data/pcsxr-1.9.94/libpcsxcore/debug.c:1079:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "499 Resetting\r\n");
data/pcsxr-1.9.94/libpcsxcore/debug.c:1099:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char reply[512];
data/pcsxr-1.9.94/libpcsxcore/debug.c:1105:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "030 %X@%08X\r\n", bp->number, psxRegs.pc);
data/pcsxr-1.9.94/libpcsxcore/debug.c:1113:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "010 %08X@%08X\r\n", address, psxRegs.pc);
data/pcsxr-1.9.94/libpcsxcore/debug.c:1120:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "011 %08X@%08X\r\n", address, psxRegs.pc);
data/pcsxr-1.9.94/libpcsxcore/debug.c:1127:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "012 %08X@%08X\r\n", address, psxRegs.pc);
data/pcsxr-1.9.94/libpcsxcore/debug.c:1134:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "013 %08X@%08X\r\n", address, psxRegs.pc);
data/pcsxr-1.9.94/libpcsxcore/debug.c:1141:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "014 %08X@%08X\r\n", address, psxRegs.pc);
data/pcsxr-1.9.94/libpcsxcore/debug.c:1148:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "015 %08X@%08X\r\n", address, psxRegs.pc);
data/pcsxr-1.9.94/libpcsxcore/debug.c:1155:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(reply, "016 %08X@%08X\r\n", address, psxRegs.pc);
data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:26:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ostr[256];
data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:62:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf (ostr, "%8.8x %8.8x:", pc, code); \
data/pcsxr-1.9.94/libpcsxcore/ix86/iR3000A.c:248:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(iRegsS, iRegs, sizeof(iRegs));
data/pcsxr-1.9.94/libpcsxcore/ix86/iR3000A.c:359:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen("dump1", "w");
data/pcsxr-1.9.94/libpcsxcore/ix86/iR3000A.c:415:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(psxRecLUT + 0x8000, psxRecLUT, 0x80 * 4);
data/pcsxr-1.9.94/libpcsxcore/ix86/iR3000A.c:416:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(psxRecLUT + 0xa000, psxRecLUT, 0x80 * 4);
data/pcsxr-1.9.94/libpcsxcore/ix86_64/iR3000A-64.c:298:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(iRegsS, iRegs, sizeof(iRegs));
data/pcsxr-1.9.94/libpcsxcore/ix86_64/iR3000A-64.c:417:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen("dump1", "w");
data/pcsxr-1.9.94/libpcsxcore/ix86_64/iR3000A-64.c:480:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(psxRecLUT + 0x8000, psxRecLUT, 0x80 * sizeof(uptr));
data/pcsxr-1.9.94/libpcsxcore/ix86_64/iR3000A-64.c:481:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(psxRecLUT + 0xa000, psxRecLUT, 0x80 * sizeof(uptr));
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:259:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy( cpuinfo.x86Type, "Standard OEM");
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:262:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy( cpuinfo.x86Type, "Overdrive");
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:265:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy( cpuinfo.x86Type, "Dual");
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:268:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy( cpuinfo.x86Type, "Reserved");
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:271:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy( cpuinfo.x86Type, "Unknown");
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:281:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy( cpuinfo.x86Fam, "Intel P6 family (Not PIV and Higher then PPro" );
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:289:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
               strcpy( cpuinfo.x86Fam, "Intel 486" );
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:296:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy( cpuinfo.x86Fam, "Intel Pentium (MMX)");
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:299:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy( cpuinfo.x86Fam, "Intel Pentium" );
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:307:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy( cpuinfo.x86Fam, "Intel Pentium Pro" );
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:313:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy( cpuinfo.x86Fam, "Intel Pentium II" );
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:320:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy( cpuinfo.x86Fam, "Intel Pentium III" );
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:323:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				  strcpy( cpuinfo.x86Fam, "Intel Core 2 Duo" );
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:327:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy( cpuinfo.x86Fam, "Intel Pentium Pro (Unknown)" );
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:335:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy( cpuinfo.x86Fam, "Willamette Intel Pentium IV" );
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:338:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy( cpuinfo.x86Fam, "Northwood Intel Pentium IV" );
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:342:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy( cpuinfo.x86Fam, "Intel Pentium IV (Unknown)" );
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:347:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
               strcpy( cpuinfo.x86Fam, "Unknown Intel CPU" );
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:362:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				 strcpy(cpuinfo.x86Fam,"AMD Athlon(tm) 64 Processor");
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:365:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				 sprintf(AMDspeedString," %d",AMDspeed);
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:366:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
				 strcat(AMDspeedString,"00+");
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:370:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				 strcpy(cpuinfo.x86Fam,"AMD Opteron(tm) Processor");
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:373:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				  strcpy( cpuinfo.x86Fam, "AMD Athlon X2 Processor" );
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:376:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				 sprintf(AMDspeedString," %d",AMDspeed);
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:377:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
				 strcat(AMDspeedString,"00+");
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:381:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				   strcpy( cpuinfo.x86Fam, "AMD Opteron(tm) Dual Core Processor" );
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:384:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				   strcpy(cpuinfo.x86Fam,"Unknown AMD 64 proccesor");
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:390:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                strcpy(cpuinfo.x86Fam,"Unsupported yet AMD64 cpu");
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:395:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			  strcpy( cpuinfo.x86Fam, "AMD K7+ Processor" );
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:407:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy( cpuinfo.x86Fam, "AMD 5x86 Processor" );
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:414:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy( cpuinfo.x86Fam, "AMD 486 Processor" );
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:419:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy( cpuinfo.x86Fam, "AMD Unknown Processor" );
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:431:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy( cpuinfo.x86Fam, "AMD K5 Processor" );
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:439:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy( cpuinfo.x86Fam, "AMD K6 Series Processor" );
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:443:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                  strcpy( cpuinfo.x86Fam, "AMD Unknown Processor" );
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:447:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
               strcpy( cpuinfo.x86Fam, "AMD Athlon XP Processor" );
data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:450:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
               strcpy( cpuinfo.x86Fam, "Unknown AMD CPU" ); 
data/pcsxr-1.9.94/libpcsxcore/mdec.c:574:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(image, mdec.block_buffer_pos, n);
data/pcsxr-1.9.94/libpcsxcore/mdec.c:590:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(image, mdec.block_buffer, size);
data/pcsxr-1.9.94/libpcsxcore/mdec.c:603:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(image, mdec.block_buffer_pos, n);
data/pcsxr-1.9.94/libpcsxcore/mdec.c:619:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(image, mdec.block_buffer, size);
data/pcsxr-1.9.94/libpcsxcore/misc.c:29:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char CdromId[10] = "";
data/pcsxr-1.9.94/libpcsxcore/misc.c:30:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char CdromLabel[33] = "";
data/pcsxr-1.9.94/libpcsxcore/misc.c:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char length			[ISODCL (1, 1)]; /* 711 */
data/pcsxr-1.9.94/libpcsxcore/misc.c:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ext_attr_length		[ISODCL (2, 2)]; /* 711 */
data/pcsxr-1.9.94/libpcsxcore/misc.c:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char extent			[ISODCL (3, 10)]; /* 733 */
data/pcsxr-1.9.94/libpcsxcore/misc.c:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char size			[ISODCL (11, 18)]; /* 733 */
data/pcsxr-1.9.94/libpcsxcore/misc.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char date			[ISODCL (19, 25)]; /* 7 by 711 */
data/pcsxr-1.9.94/libpcsxcore/misc.c:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char flags			[ISODCL (26, 26)];
data/pcsxr-1.9.94/libpcsxcore/misc.c:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char file_unit_size		[ISODCL (27, 27)]; /* 711 */
data/pcsxr-1.9.94/libpcsxcore/misc.c:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char interleave			[ISODCL (28, 28)]; /* 711 */
data/pcsxr-1.9.94/libpcsxcore/misc.c:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char volume_sequence_number	[ISODCL (29, 32)]; /* 723 */
data/pcsxr-1.9.94/libpcsxcore/misc.c:50:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char name_len		[ISODCL (33, 33)]; /* 711 */
data/pcsxr-1.9.94/libpcsxcore/misc.c:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name			[1];
data/pcsxr-1.9.94/libpcsxcore/misc.c:98:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(_dir, buf + 12, 2048); \
data/pcsxr-1.9.94/libpcsxcore/misc.c:102:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(_dir + 2048, buf + 12, 2048);
data/pcsxr-1.9.94/libpcsxcore/misc.c:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ddir[4096];
data/pcsxr-1.9.94/libpcsxcore/misc.c:200:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&tmpHead, buf + 12, sizeof(EXE_HEADER));
data/pcsxr-1.9.94/libpcsxcore/misc.c:217:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		if (ptr != NULL) memcpy(ptr, buf+12, 2048);
data/pcsxr-1.9.94/libpcsxcore/misc.c:249:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(head, buf + 12, sizeof(EXE_HEADER));
data/pcsxr-1.9.94/libpcsxcore/misc.c:261:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void *)PSXM(addr), buf + 12, 2048);
data/pcsxr-1.9.94/libpcsxcore/misc.c:272:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char time[4], *buf;
data/pcsxr-1.9.94/libpcsxcore/misc.c:273:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char mdir[4096];
data/pcsxr-1.9.94/libpcsxcore/misc.c:274:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char exename[256];
data/pcsxr-1.9.94/libpcsxcore/misc.c:321:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(exename, "PSX.EXE;1");
data/pcsxr-1.9.94/libpcsxcore/misc.c:322:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(CdromId, "SLUS99999");
data/pcsxr-1.9.94/libpcsxcore/misc.c:386:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/misc.c:391:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(buf, "rb");
data/pcsxr-1.9.94/libpcsxcore/misc.c:414:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	tmpFile = fopen(ExePath, "rb");
data/pcsxr-1.9.94/libpcsxcore/misc.c:503:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char PcsxrHeader[32] = "STv4 PCSXR v" PACKAGE_VERSION;
data/pcsxr-1.9.94/libpcsxcore/misc.c:572:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char header[32];
data/pcsxr-1.9.94/libpcsxcore/misc.c:625:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char header[32];
data/pcsxr-1.9.94/libpcsxcore/misc.h:36:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char id[8];
data/pcsxr-1.9.94/libpcsxcore/misc.h:56:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char CdromId[10];
data/pcsxr-1.9.94/libpcsxcore/misc.h:57:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char CdromLabel[33];
data/pcsxr-1.9.94/libpcsxcore/plugins.c:27:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char IsoFile[MAXPATHLEN] = "";
data/pcsxr-1.9.94/libpcsxcore/plugins.c:240:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	LoadGpuSym1(open, "GPUopen");
data/pcsxr-1.9.94/libpcsxcore/plugins.c:316:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	LoadCdrSym1(open, "CDRopen");
data/pcsxr-1.9.94/libpcsxcore/plugins.c:365:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	LoadSpuSym1(open, "SPUopen");
data/pcsxr-1.9.94/libpcsxcore/plugins.c:388:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char buf[256];
data/pcsxr-1.9.94/libpcsxcore/plugins.c:389:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char stdpar[10] = { 0x00, 0x41, 0x5a, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff };
data/pcsxr-1.9.94/libpcsxcore/plugins.c:390:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char mousepar[8] = { 0x00, 0x12, 0x5a, 0xff, 0xff, 0xff, 0xff };
data/pcsxr-1.9.94/libpcsxcore/plugins.c:391:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char analogpar[9] = { 0x00, 0xff, 0x5a, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff };
data/pcsxr-1.9.94/libpcsxcore/plugins.c:407:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, mousepar, 7);
data/pcsxr-1.9.94/libpcsxcore/plugins.c:419:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, analogpar, 9);
data/pcsxr-1.9.94/libpcsxcore/plugins.c:431:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, analogpar, 9);
data/pcsxr-1.9.94/libpcsxcore/plugins.c:443:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, analogpar, 9);
data/pcsxr-1.9.94/libpcsxcore/plugins.c:451:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, stdpar, 5);
data/pcsxr-1.9.94/libpcsxcore/plugins.c:505:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	LoadPad1Sym1(open, "PADopen");
data/pcsxr-1.9.94/libpcsxcore/plugins.c:564:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	LoadPad2Sym1(open, "PADopen");
data/pcsxr-1.9.94/libpcsxcore/plugins.c:610:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	LoadNetSym1(open, "NETopen");
data/pcsxr-1.9.94/libpcsxcore/plugins.c:689:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    LoadSio1Sym0(open, "SIO1open");
data/pcsxr-1.9.94/libpcsxcore/plugins.c:733:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Plugin[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/plugins.h:88:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char psxVRam[1024*512*2];
data/pcsxr-1.9.94/libpcsxcore/plugins.h:148:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char Time[3];
data/pcsxr-1.9.94/libpcsxcore/plugins.h:153:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char res0[12];
data/pcsxr-1.9.94/libpcsxcore/plugins.h:157:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char TrackRelativeAddress[3];
data/pcsxr-1.9.94/libpcsxcore/plugins.h:159:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char AbsoluteAddress[3];
data/pcsxr-1.9.94/libpcsxcore/plugins.h:160:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char CRC[2];
data/pcsxr-1.9.94/libpcsxcore/plugins.h:161:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char res1[72];
data/pcsxr-1.9.94/libpcsxcore/plugins.h:204:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char PluginName[8];
data/pcsxr-1.9.94/libpcsxcore/plugins.h:207:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char SPUPorts[0x200];
data/pcsxr-1.9.94/libpcsxcore/plugins.h:208:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char SPURam[0x80000];
data/pcsxr-1.9.94/libpcsxcore/plugins.h:302:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char EmuName[32];
data/pcsxr-1.9.94/libpcsxcore/plugins.h:303:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CdromID[9];	// ie. 'SCPH12345', no \0 trailing character
data/pcsxr-1.9.94/libpcsxcore/plugins.h:304:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CdromLabel[11];
data/pcsxr-1.9.94/libpcsxcore/plugins.h:309:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char GPUpath[256];	// paths must be absolute
data/pcsxr-1.9.94/libpcsxcore/plugins.h:310:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char SPUpath[256];
data/pcsxr-1.9.94/libpcsxcore/plugins.h:311:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char CDRpath[256];
data/pcsxr-1.9.94/libpcsxcore/plugins.h:312:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char MCD1path[256];
data/pcsxr-1.9.94/libpcsxcore/plugins.h:313:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char MCD2path[256];
data/pcsxr-1.9.94/libpcsxcore/plugins.h:314:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char BIOSpath[256];	// 'HLE' for internal bios
data/pcsxr-1.9.94/libpcsxcore/plugins.h:315:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Unused[1024];
data/pcsxr-1.9.94/libpcsxcore/ppc/pR3000A.c:906:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(iRegsS, iRegs, sizeof(iRegs));
data/pcsxr-1.9.94/libpcsxcore/ppc/pR3000A.c:907:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(HWRegistersS, HWRegisters, sizeof(HWRegisters));
data/pcsxr-1.9.94/libpcsxcore/ppc/pR3000A.c:1090:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(psxRecLUT + 0x8000, psxRecLUT, 0x80 * 4);
data/pcsxr-1.9.94/libpcsxcore/ppc/pR3000A.c:1091:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(psxRecLUT + 0xa000, psxRecLUT, 0x80 * 4);
data/pcsxr-1.9.94/libpcsxcore/ppc/pR3000A.c:3526:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf((char *)ppcPtr, "PC=%08x", pcold);
data/pcsxr-1.9.94/libpcsxcore/ppf.c:128:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(pB + pos, (unsigned char *)(p + 1) + start, anz);
data/pcsxr-1.9.94/libpcsxcore/ppf.c:141:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ppfHead + 1, ppfmem, anz);
data/pcsxr-1.9.94/libpcsxcore/ppf.c:172:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(padd + 1, ppfmem, anz);
data/pcsxr-1.9.94/libpcsxcore/ppf.c:183:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buffer[12];
data/pcsxr-1.9.94/libpcsxcore/ppf.c:186:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	ppfmem[512];
data/pcsxr-1.9.94/libpcsxcore/ppf.c:187:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			szPPF[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/ppf.c:212:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	ppffile = fopen(szPPF, "rb");
data/pcsxr-1.9.94/libpcsxcore/ppf.c:342:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[16], sbifile[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/ppf.c:369:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	sbihandle = fopen(filename, "rb");
data/pcsxr-1.9.94/libpcsxcore/psemu_plugin_defs.h:61:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char reserved[100];
data/pcsxr-1.9.94/libpcsxcore/psemu_plugin_defs.h:209:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char reserved[91];
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:27:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *biosA0n[256] = {
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:88:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *biosB0n[256] = {
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:121:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *biosC0n[256] = {
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:221:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[20];
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:226:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char system[4];
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:230:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[32];
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:295:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(regs, psxRegs.GPR.r, 32*4);
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:302:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(psxRegs.GPR.r, regs, 32*4);
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:946:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[1024];
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:947:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp2[1024];
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:952:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(save, (char*)PSXM(sp), 4 * 4);
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1006:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((char*)PSXM(sp), save, 4 * 4);
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1029:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(Ra1, ((char*)&eheader)+16, sizeof(EXEC));
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1531:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(Thread[CurThread].reg, psxRegs.GPR.r, 32*4);
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1534:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(psxRegs.GPR.r, Thread[th].reg, 32*4);
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1732:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(Ra1, ptr, a2); \
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1765:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, Ra1, a2); \
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1817:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char psxstrbuf[PSXSTRBUFMAX+1];
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1849:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ffile[64], *pfile;
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1946:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr+0xa, Ra1+5, namelen); \
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:2061:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(Mcd1Data + a1 * 128, Ra2, 128);
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:2064:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(Mcd2Data + a1 * 128, Ra2, 128);
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:2085:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(Ra2, Mcd1Data + a1 * 128, 128);
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:2087:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(Ra2, Mcd2Data + a1 * 128, 128);
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:2603:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy((char *)&psxM[0x248], "bu");
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:2830:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	if (Mode == 1) memcpy(&psxR[base], ptr, size); \
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:2831:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	if (Mode == 0) memcpy(ptr, &psxR[base], size); \
data/pcsxr-1.9.94/libpcsxcore/psxbios.h:33:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char *biosA0n[256];
data/pcsxr-1.9.94/libpcsxcore/psxbios.h:34:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char *biosB0n[256];
data/pcsxr-1.9.94/libpcsxcore/psxbios.h:35:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char *biosC0n[256];
data/pcsxr-1.9.94/libpcsxcore/psxcommon.c:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[1024];
data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:126:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Gpu[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:127:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Spu[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:128:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Cdr[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:129:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Pad1[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Pad2[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Net[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:132:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Sio1[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:133:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Mcd1[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:134:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Mcd2[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:135:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Bios[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char BiosDir[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char PluginsDir[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:138:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char PatchesDir[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char IsoImgDir[MAXPATHLEN];
data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Lang[256];
data/pcsxr-1.9.94/libpcsxcore/psxcounters.c:98:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[ 4096 ];
data/pcsxr-1.9.94/libpcsxcore/psxmem.c:85:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(psxMemRLUT + 0x8000, psxMemRLUT, 0x80 * sizeof(void *));
data/pcsxr-1.9.94/libpcsxcore/psxmem.c:86:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(psxMemRLUT + 0xa000, psxMemRLUT, 0x80 * sizeof(void *));
data/pcsxr-1.9.94/libpcsxcore/psxmem.c:93:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(psxMemRLUT + 0x9fc0, psxMemRLUT + 0x1fc0, 0x08 * sizeof(void *));
data/pcsxr-1.9.94/libpcsxcore/psxmem.c:94:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(psxMemRLUT + 0xbfc0, psxMemRLUT + 0x1fc0, 0x08 * sizeof(void *));
data/pcsxr-1.9.94/libpcsxcore/psxmem.c:99:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(psxMemWLUT + 0x8000, psxMemWLUT, 0x80 * sizeof(void *));
data/pcsxr-1.9.94/libpcsxcore/psxmem.c:100:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(psxMemWLUT + 0xa000, psxMemWLUT, 0x80 * sizeof(void *));
data/pcsxr-1.9.94/libpcsxcore/psxmem.c:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bios[1024];
data/pcsxr-1.9.94/libpcsxcore/psxmem.c:118:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen(bios, "rb");
data/pcsxr-1.9.94/libpcsxcore/psxmem.c:157:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		p = (char *)(psxMemRLUT[t]);
data/pcsxr-1.9.94/libpcsxcore/psxmem.c:186:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		p = (char *)(psxMemRLUT[t]);
data/pcsxr-1.9.94/libpcsxcore/psxmem.c:215:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		p = (char *)(psxMemRLUT[t]);
data/pcsxr-1.9.94/libpcsxcore/psxmem.c:244:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		p = (char *)(psxMemWLUT[t]);
data/pcsxr-1.9.94/libpcsxcore/psxmem.c:275:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		p = (char *)(psxMemWLUT[t]);
data/pcsxr-1.9.94/libpcsxcore/psxmem.c:307:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		p = (char *)(psxMemWLUT[t]);
data/pcsxr-1.9.94/libpcsxcore/psxmem.c:343:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(psxMemWLUT + 0x8000, psxMemWLUT, 0x80 * sizeof(void *));
data/pcsxr-1.9.94/libpcsxcore/psxmem.c:344:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(psxMemWLUT + 0xa000, psxMemWLUT, 0x80 * sizeof(void *));
data/pcsxr-1.9.94/libpcsxcore/psxmem.c:368:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		p = (char *)(psxMemWLUT[t]);
data/pcsxr-1.9.94/libpcsxcore/sio.c:57:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char buf[ BUFFER_SIZE ];
data/pcsxr-1.9.94/libpcsxcore/sio.c:59:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char cardh[4] = { 0x00, 0x00, 0x5a, 0x5d };
data/pcsxr-1.9.94/libpcsxcore/sio.c:75:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char Mcd1Data[MCD_SIZE], Mcd2Data[MCD_SIZE];
data/pcsxr-1.9.94/libpcsxcore/sio.c:81:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char DongleData[ DONGLE_SIZE ];
data/pcsxr-1.9.94/libpcsxcore/sio.c:277:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(&buf[4], Mcd1Data + (adrL | (adrH << 8)) * 128, 128);
data/pcsxr-1.9.94/libpcsxcore/sio.c:280:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(&buf[4], Mcd2Data + (adrL | (adrH << 8)) * 128, 128);
data/pcsxr-1.9.94/libpcsxcore/sio.c:498:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy( DongleData + DongleBank * 0x1000, buf+1, 0x1000 );
data/pcsxr-1.9.94/libpcsxcore/sio.c:707:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(buf, buf + 128, 32);
data/pcsxr-1.9.94/libpcsxcore/sio.c:722:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buf, cardh, 4);
data/pcsxr-1.9.94/libpcsxcore/sio.c:787:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(Mcd1Data + (adrL | (adrH << 8)) * 128, &buf[1], 128);
data/pcsxr-1.9.94/libpcsxcore/sio.c:791:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
							memcpy(Mcd2Data + (adrL | (adrH << 8)) * 128, &buf[1], 128);
data/pcsxr-1.9.94/libpcsxcore/sio.c:875:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(str, "memcards/card%d.mcd", mcd);
data/pcsxr-1.9.94/libpcsxcore/sio.c:878:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(str, "rb");
data/pcsxr-1.9.94/libpcsxcore/sio.c:882:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen(str, "rb");
data/pcsxr-1.9.94/libpcsxcore/sio.c:920:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(mcd, "r+b");
data/pcsxr-1.9.94/libpcsxcore/sio.c:941:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(mcd, "wb");
data/pcsxr-1.9.94/libpcsxcore/sio.c:957:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(mcd, "wb");
data/pcsxr-1.9.94/libpcsxcore/sio.c:1113:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen(mcd, "wb");
data/pcsxr-1.9.94/libpcsxcore/sio.c:1118:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen(mcd, "r+");
data/pcsxr-1.9.94/libpcsxcore/sio.c:1147:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen(mcd, "wb");
data/pcsxr-1.9.94/libpcsxcore/sio.c:1152:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen(mcd, "r+");
data/pcsxr-1.9.94/libpcsxcore/sio.c:1169:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		f = fopen(mcd, "wb");
data/pcsxr-1.9.94/libpcsxcore/sio.c:1287:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(str, "r+b");
data/pcsxr-1.9.94/libpcsxcore/sio.c:1323:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(str, "wb");
data/pcsxr-1.9.94/libpcsxcore/sio.h:36:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char Mcd1Data[MCD_SIZE], Mcd2Data[MCD_SIZE];
data/pcsxr-1.9.94/libpcsxcore/sio.h:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Title[48 + 1]; // Title in ASCII
data/pcsxr-1.9.94/libpcsxcore/sio.h:63:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sTitle[48 * 2 + 1]; // Title in Shift-JIS
data/pcsxr-1.9.94/libpcsxcore/sio.h:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ID[12 + 1];
data/pcsxr-1.9.94/libpcsxcore/sio.h:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Name[16 + 1];
data/pcsxr-1.9.94/libpcsxcore/socket.c:37:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char tbuf[513];
data/pcsxr-1.9.94/libpcsxcore/socket.c:99:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hello[256];
data/pcsxr-1.9.94/libpcsxcore/socket.c:200:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buffer, tbuf, mlen);
data/pcsxr-1.9.94/macosx/Plugin.c:104:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char path[MAXPATHLEN];
data/pcsxr-1.9.94/macosx/plugins/Bladesio1/macsrc/cfg.c:35:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(settings.ip, "127.0.0.1");
data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:35:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cdDevice[4096] = "";
data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CD_FRAMESIZE_RAW];
data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:42:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(dev, O_RDONLY, 0);
data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:91:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char psz_buf[0x32];
data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:104:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(psz_buf, "/dev/r");
data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:140:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	cdHandle = open(cdDevice, O_RDONLY, 0);
data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:185:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[CD_FRAMESIZE_RAW];
data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:203:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cr->buf, buf, CD_FRAMESIZE_RAW);
data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:229:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	cdHandle = open(cdDevice, O_RDONLY, 0);
data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cfg.c:28:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char CdromDev[256];
data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:144:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[64];
data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:155:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "0x%.2X", key);
data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:159:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *hatname[16] = {"Centered", "Up", "Right", "Rightup",
data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:167:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buf, _("Joystick: Button %d"), g.cfg.PadDef[joynum].KeyDef[key].J.Button);
data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:171:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buf, _("Joystick: Axis %d%c"), abs(g.cfg.PadDef[joynum].KeyDef[key].J.Axis) - 1,
data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:188:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(buf, " / ");
data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:190:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char keyboardBuf[64] = {0};
data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:201:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buf, _("Joystick: Button %d"), g.cfg.PadDef[joynum].AnalogDef[analognum][dir].J.Button);
data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:205:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buf, _("Joystick: Axis %d%c"), abs(g.cfg.PadDef[joynum].AnalogDef[analognum][dir].J.Axis) - 1,
data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:222:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(buf, " / ");
data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:224:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char keyboardBuf[64] = {0};
data/pcsxr-1.9.94/macosx/plugins/DFNet/macsrc/cfg.c:33:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(CFG_FILENAME, "w");
data/pcsxr-1.9.94/plugins/bladesio1/cfg.c:41:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file = fopen(configName, "rb");
data/pcsxr-1.9.94/plugins/bladesio1/cfg.c:48:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(settings.ip, "127.0.0.1");
data/pcsxr-1.9.94/plugins/bladesio1/cfg.c:56:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	file = fopen(configName, "wb");
data/pcsxr-1.9.94/plugins/bladesio1/gui.c:55:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(IPAddress, "127.0.0.1");
data/pcsxr-1.9.94/plugins/bladesio1/gui.c:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[256];
data/pcsxr-1.9.94/plugins/bladesio1/gui.c:85:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	else strcpy(IPAddress, "127.0.0.1");
data/pcsxr-1.9.94/plugins/bladesio1/gui.c:93:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[512];
data/pcsxr-1.9.94/plugins/bladesio1/gui.c:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[256];
data/pcsxr-1.9.94/plugins/bladesio1/sio1.c:550:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cfg[256];
data/pcsxr-1.9.94/plugins/bladesio1/sio1.c:553:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(cfg, "./cfgBladeSio1");
data/pcsxr-1.9.94/plugins/bladesio1/sio1.c:567:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(cfg, "./cfg/cfgBladeSio1");
data/pcsxr-1.9.94/plugins/bladesio1/sio1.h:74:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ip[32];
data/pcsxr-1.9.94/plugins/dfcdrom/cdr-libcdio.c:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buf[16];
data/pcsxr-1.9.94/plugins/dfcdrom/cdr-libcdio.c:138:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char msf[3];
data/pcsxr-1.9.94/plugins/dfcdrom/cdr-libcdio.c:233:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static unsigned char buf[CD_FRAMESIZE_RAW + 96];
data/pcsxr-1.9.94/plugins/dfcdrom/cdr-linux.c:66:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		buf[CD_FRAMESIZE_RAW];
data/pcsxr-1.9.94/plugins/dfcdrom/cdr-linux.c:90:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		buf[CD_FRAMESIZE_RAW + 96];
data/pcsxr-1.9.94/plugins/dfcdrom/cdr-linux.c:116:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	cdHandle = open(dev, O_RDONLY);
data/pcsxr-1.9.94/plugins/dfcdrom/cdr-linux.c:180:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char msf[3];
data/pcsxr-1.9.94/plugins/dfcdrom/cdr-linux.c:233:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char ptmp[4];
data/pcsxr-1.9.94/plugins/dfcdrom/cdr-linux.c:279:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(stat->Time, &sc.cdsc_absaddr.msf, 3);
data/pcsxr-1.9.94/plugins/dfcdrom/cdr-linux.c:320:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static unsigned char buf[CD_FRAMESIZE_RAW + 96];
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:42:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char lastTime[3];
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:257:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char curTime[3];
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:270:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(curTime, &cr.msf, 3);
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:323:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	if (UseSubQ) memcpy(lastTime, time, 3);
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:444:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char msf[3] = {itob(m), itob(s), itob(f)};
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:452:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer, p - 12, CD_FRAMESIZE_RAW); // copy from the beginning of the sector
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:472:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cfg[256];
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:475:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(cfg, "./cfgDFCdrom");
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:489:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(cfg, "./cfg/cfgDFCdrom");
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:118:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char CdromDev[256];
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:161:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char StartingLBA[4];
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:162:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char TransferBlocks[3];
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:183:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char Time[3];		// current playing time
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:187:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char res0[12];
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:191:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char TrackRelativeAddress[3];
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:193:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char AbsoluteAddress[3];
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:194:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char CRC[2];
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:195:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char res1[72];
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:200:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[CD_FRAMESIZE_RAW];
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:204:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char msf[3];
data/pcsxr-1.9.94/plugins/dfcdrom/cdrcfg-0.1df/main.c:41:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(device, O_RDONLY | O_NONBLOCK)) < 0) return 0;
data/pcsxr-1.9.94/plugins/dfcdrom/cdrcfg-0.1df/main.c:123:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cdrom_devices[256][256];
data/pcsxr-1.9.94/plugins/dfcdrom/cdrcfg-0.1df/main.c:125:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256], *devname, *nick;
data/pcsxr-1.9.94/plugins/dfcdrom/cfg.c:24:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char CdromDev[256];
data/pcsxr-1.9.94/plugins/dfcdrom/cfg.c:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256], *devname, *nick;
data/pcsxr-1.9.94/plugins/dfcdrom/cfg.c:67:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen("dfcdrom.cfg", "r");
data/pcsxr-1.9.94/plugins/dfcdrom/cfg.c:88:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen("dfcdrom.cfg", "w");
data/pcsxr-1.9.94/plugins/dfcdrom/util.c:39:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char subQData[12];
data/pcsxr-1.9.94/plugins/dfcdrom/util.c:50:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&subbuffer[12], subQData, 12);
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:30:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *widgetname_treeview[3] = {"treeview_e", "treeview1", "treeview2"};
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:31:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *widgetname_change[3] = {"btnchange_e", "btnchange1", "btnchange2"};
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:32:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *widgetname_reset[3] = {"btnreset_e", "btnreset1", "btnreset2"};
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:33:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *widgetname_combodev[3] = {"combodev_e", "combodev1", "combodev2"};
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:57:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *EmuKeyText[EMU_TOTAL] = {
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:66:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *DPadText[DKEY_TOTAL] = {
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:120:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *hatname[16] = {_("Centered"), _("Up"), _("Right"), _("Rightup"),
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:128:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buf, _("Joystick: Button %d"), keydef->J.Button);
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:132:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buf, _("Joystick: Axis %d%c"), abs(keydef->J.Axis) - 1,
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:149:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(buf, " / ");
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:152:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(buf, _("Keyboard:"));
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:156:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(buf, _("(Not Set)"));
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:161:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char *hatname[16] = {_("Centered"), _("Up"), _("Right"), _("Rightup"),
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:167:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buf, _("Joystick: Button %d"), g.cfg.PadDef[joynum].AnalogDef[analognum][dir].J.Button);
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:171:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buf, _("Joystick: Axis %d%c"), abs(g.cfg.PadDef[joynum].AnalogDef[analognum][dir].J.Axis) - 1,
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:188:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(buf, " / ");
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:191:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(buf, _("Keyboard:"));
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:195:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(buf, _("(Not Set)"));
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:204:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:256:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:367:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buttons[32];
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:461:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buttons[32];
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:594:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/pcsxr-1.9.94/plugins/dfinput/cfg.c:132:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[256];
data/pcsxr-1.9.94/plugins/dfinput/cfg.c:137:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(CONFIG_FILE, "r");
data/pcsxr-1.9.94/plugins/dfinput/cfg.c:146:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			g.cfg.Threaded = atoi(&buf[9]);
data/pcsxr-1.9.94/plugins/dfinput/cfg.c:148:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			g.cfg.HideCursor = atoi(&buf[11]);
data/pcsxr-1.9.94/plugins/dfinput/cfg.c:150:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			g.cfg.PreventScrSaver = atoi(&buf[16]);
data/pcsxr-1.9.94/plugins/dfinput/cfg.c:152:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			current = atoi(&buf[4]) - 1;
data/pcsxr-1.9.94/plugins/dfinput/cfg.c:159:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			g.cfg.PadDef[current].DevNum = atoi(&buf[7]);
data/pcsxr-1.9.94/plugins/dfinput/cfg.c:161:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			g.cfg.PadDef[current].Type = atoi(&buf[5]);
data/pcsxr-1.9.94/plugins/dfinput/cfg.c:163:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			g.cfg.PadDef[current].VisualVibration = atoi(&buf[16]);
data/pcsxr-1.9.94/plugins/dfinput/cfg.c:165:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			g.cfg.E.DevNum = atoi(&buf[5]);
data/pcsxr-1.9.94/plugins/dfinput/cfg.c:331:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(CONFIG_FILE, "w");
data/pcsxr-1.9.94/plugins/dfinput/pad.c:262:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		dev = open(sdlj, O_RDONLY);
data/pcsxr-1.9.94/plugins/dfinput/pad.c:266:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
				dev = open(sdlj, O_RDWR);
data/pcsxr-1.9.94/plugins/dfinput/pad.c:285:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[20];
data/pcsxr-1.9.94/plugins/dfinput/pad.c:287:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf, "/dev/input/event%d", devno);
data/pcsxr-1.9.94/plugins/dfinput/pad.c:288:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		dev = open(buf, O_RDONLY);
data/pcsxr-1.9.94/plugins/dfinput/pad.c:298:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
					dev = open(buf, O_RDWR);
data/pcsxr-1.9.94/plugins/dfinput/xkb.c:48:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/pcsxr-1.9.94/plugins/dfinput/xkb.c:80:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[64];
data/pcsxr-1.9.94/plugins/dfnet/cfg.c:19:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(CFG_FILENAME, "w");
data/pcsxr-1.9.94/plugins/dfnet/cfg.c:28:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(CFG_FILENAME, "r");
data/pcsxr-1.9.94/plugins/dfnet/cfg.c:32:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(conf.ipAddress, "127.0.0.1");
data/pcsxr-1.9.94/plugins/dfnet/dfnet.c:234:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&PadSendData[PadCount], pData, Size);
data/pcsxr-1.9.94/plugins/dfnet/dfnet.c:250:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(pData, &PadSendData[PadCount == 0 ? PadCountMax-1 : PadCount-1], PadSendSize);
data/pcsxr-1.9.94/plugins/dfnet/dfnet.h:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ipAddress[32];
data/pcsxr-1.9.94/plugins/dfnet/dfnet.h:83:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char PadSize[2];
data/pcsxr-1.9.94/plugins/dfnet/gui.c:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[512];
data/pcsxr-1.9.94/plugins/dfnet/gui.c:54:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(IPAddress, "127.0.0.1");
data/pcsxr-1.9.94/plugins/dfnet/gui.c:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[256];
data/pcsxr-1.9.94/plugins/dfnet/gui.c:84:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	else strcpy(IPAddress, "127.0.0.1");
data/pcsxr-1.9.94/plugins/dfnet/gui.c:90:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[256];
data/pcsxr-1.9.94/plugins/dfnet/gui.c:100:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/pcsxr-1.9.94/plugins/dfnet/gui.c:122:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%d", conf.PortNum);
data/pcsxr-1.9.94/plugins/dfnet/gui.c:138:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		conf.PortNum = atoi(gtk_entry_get_text(GTK_ENTRY(widget)));
data/pcsxr-1.9.94/plugins/dfnet/gui.c:195:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[512];
data/pcsxr-1.9.94/plugins/dfnet/unix.c:23:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cfg[512];
data/pcsxr-1.9.94/plugins/dfnet/unix.c:25:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(cfg, "cfg/cfgDFNet");
data/pcsxr-1.9.94/plugins/dfnet/unix.c:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data[32];
data/pcsxr-1.9.94/plugins/dfnet/unix.c:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[512];
data/pcsxr-1.9.94/plugins/dfnet/unix.c:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd[512];
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char filename[255];
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:39:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(filename,"cfgDFSound");
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:40:5:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 cf=fopen(filename,"rb");
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:67:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 FILE *in;char t[256];int len;
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:70:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"dfsound.cfg");
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:71:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 in = fopen(t,"rb"); 
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:74:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(t,"cfg/dfsound.cfg");
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:75:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   in = fopen(t,"rb"); 
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:79:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     in = fopen(t,"rb"); 
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:90:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nVolume");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:91:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) iVolume=4-atoi(p+len);
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:95:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nXAPitch");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:96:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) iXAPitch=atoi(p+len);
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:100:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nHighCompMode");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} 
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:101:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p)  iUseTimer=atoi(p+len); 
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:107:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nSPUIRQWait");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} 
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:108:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p)  iSPUIRQWait=atoi(p+len); 
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:112:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nUseReverb");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} 
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:113:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p)  iUseReverb=atoi(p+len); 
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:117:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nUseInterpolation");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} 
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:118:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p)  iUseInterpolation=atoi(p+len); 
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:122:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nDisStereo");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} 
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:123:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p)  iDisStereo=atoi(p+len); 
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:127:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nFreqResponse");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} 
data/pcsxr-1.9.94/plugins/dfsound/cfg.c:128:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p)  iFreqResponse=atoi(p+len); 
data/pcsxr-1.9.94/plugins/dfsound/freeze.c:33:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char          szSPUName[8];
data/pcsxr-1.9.94/plugins/dfsound/freeze.c:36:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char cSPUPort[0x200];
data/pcsxr-1.9.94/plugins/dfsound/freeze.c:37:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char cSPURam[0x80000];
data/pcsxr-1.9.94/plugins/dfsound/freeze.c:78:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(pF->szSPUName,"PBOSS");
data/pcsxr-1.9.94/plugins/dfsound/freeze.c:86:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pF->cSPURam,spuMem,0x80000);                 // copy common infos
data/pcsxr-1.9.94/plugins/dfsound/freeze.c:87:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pF->cSPUPort,regArea,0x200);
data/pcsxr-1.9.94/plugins/dfsound/freeze.c:106:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy((void *)&pFO->s_chan[i],(void *)&s_chan[i],sizeof(SPUCHAN));
data/pcsxr-1.9.94/plugins/dfsound/freeze.c:132:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 memcpy(spuMem,pF->cSPURam,0x80000);                   // get ram
data/pcsxr-1.9.94/plugins/dfsound/freeze.c:133:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 memcpy(regArea,pF->cSPUPort,0x200);
data/pcsxr-1.9.94/plugins/dfsound/freeze.c:198:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy((void *)&s_chan[i],(void *)&pFO->s_chan[i],sizeof(SPUCHAN));
data/pcsxr-1.9.94/plugins/dfsound/openal.c:153:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[BUFFER_SIZE];
data/pcsxr-1.9.94/plugins/dfsound/oss.c:55:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 if((oss_audio_fd=open("/dev/dsp",O_WRONLY,0))==-1)
data/pcsxr-1.9.94/plugins/dfsound/spu.c:376:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char NoiseWaveAdd [64] = {
data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:32:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    val = atoi(p + len);
data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:57:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char t[256];
data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cfg[255];
data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:110:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		in = fopen(cfg, READBINARY);
data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:124:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(t, "\nVolume");
data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:136:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(t, "\nUseInterpolation");
data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:148:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(t, "\nXAPitch");
data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:160:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(t, "\nHighCompMode");
data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:172:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(t, "\nSPUIRQWait");
data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:185:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(t, "\nDisStereo");
data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:198:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(t, "\nFreqResponse");
data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:211:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(t, "\nUseReverb");
data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:245:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(CONFIG_FILENAME, WRITEBINARY);
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:42:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if (*p != '\n') var = atoi(p); \
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:59:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   len = sprintf(t1, "%d", var); \
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:74:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   len = sprintf(t1, "%.1f", (double)var); \
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:86:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 FILE *in;char t[256];int len, size;
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:93:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(t,"dfxvideo.cfg");
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:94:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   in = fopen(t,"rb");
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:97:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(t,"cfg/dfxvideo.cfg");
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:98:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     in = fopen(t,"rb");
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:108:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 in = fopen(t,"rb");
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:170:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cfg[256];
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:173:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(cfg, "./cfgDFXVideo");
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:187:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(cfg, "./cfg/cfgDFXVideo");
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:258:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 FILE *out;char t[256];int len, size;
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:259:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char * pB, * p; char t1[8];
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:265:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(t,"dfxvideo.cfg");
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:266:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   out = fopen(t,"rb");
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:269:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(t,"cfg/dfxvideo.cfg");
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:270:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     out = fopen(t,"rb");
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:280:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 out = fopen(t,"rb");
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:323:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 out = fopen(t,"wb");
data/pcsxr-1.9.94/plugins/dfxvideo/draw.c:1873:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static unsigned char cache_vert_mask[640];
data/pcsxr-1.9.94/plugins/dfxvideo/draw.c:2014:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static unsigned char cache_vert_mask[640];
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:113:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char              szDispBuf[64];
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:114:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char              szMenuBuf[36];
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:115:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char              szDebugText[512];
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:256:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char szO[2][4]={"off","on "};
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:257:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char szTxt[256];
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:269:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(szTxt,"Resolution/Color:\r\n- %dx%d ",LOWORD(iWinSize),HIWORD(iWinSize));
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:271:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(szTxt,"Resolution/Color:\r\n- %dx%d ",iResX,iResY);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:274:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(szTxt,"Window mode\r\n");
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:277:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(szTxt,"Window mode - [%d Bit]\r\n",iDesktopCol);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:279:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(szTxt,"Fullscreen - [%d Bit]\r\n",iColDepth);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:282:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(szTxt,"Stretch mode: %d\r\n",iUseNoStretchBlt);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:284:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(szTxt,"Dither mode: %d\r\n\r\n",iUseDither);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:291:15:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
 if(iFastFwd) strcat(pB," (fast forward)");
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:292:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
 strcat(pB,"\r\n");
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:294:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(szTxt,"- FPS limit: Auto\r\n\r\n");
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:295:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 else sprintf(szTxt,"- FPS limit: %.1f\r\n\r\n",fFrameRate);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:299:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(szTxt,"Misc:\r\n- MaintainAspect: ");
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:300:27:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
 if(iMaintainAspect == 0) strcat(szTxt,"disabled");
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:302:27:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
 if(iMaintainAspect == 1) strcat(szTxt,"enabled");
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:303:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
 strcat(szTxt,"\r\n");
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:315:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char szTxt[256];
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:319:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(szTxt,"snap\\pcsxr%04d.txt",iNum);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:324:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 if ((txtfile = fopen(szTxt, "wb")) == NULL)
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:339:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char filename[256];
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:340:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char header[0x36];
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:342:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char line[1024 * 3];
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:344:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char empty[2] = {0,0};
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:381:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(filename,"snap\\pcsxr%04ld.bmp",snapshotnr);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:386:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   bmpfile = fopen(filename,"rb");
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:395:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 if ((bmpfile = fopen(filename,"wb")) == NULL)
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:609:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(szDispBuf,"FPS %06.1f",fps_cur);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:1388:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char primTableCX[256] =
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:1750:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char psxVRam[1024*1024*2]; // current VRam image (full 2 MB for ZN)
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:1774:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pF->ulControl,ulStatusControl,256*sizeof(uint32_t));
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:1775:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pF->psxVRam,  psxVub,         1024*iGPUHeight*2);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:1783:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 memcpy(ulStatusControl,pF->ulControl,256*sizeof(uint32_t));
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:1784:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 memcpy(psxVub,         pF->psxVRam,  1024*iGPUHeight*2);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:1818:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char cFont[10][120]=
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:44:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	    val = atoi(p + len);
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:106:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  FILE *in;char t[256];int len,val; 
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:109:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cfg[255];
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:111:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tempstr[50];
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:161:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		in = fopen(cfg,READBINARY);
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:175:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(t,"\nResX");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:192:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(t,"\nNoStretch");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:202:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(t,"\nDithering");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:212:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(t,"\nMaintain43");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:222:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(t,"\nFullScreen");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:232:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(t,"\nShowFPS");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:242:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(t,"\nUseFrameLimit");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:251:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(t,"\nFPSDetection");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:260:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(t,"\nUseFrameSkip");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:269:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(t,"\nFrameRate");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:270:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			if(p) valf=(float)atoi(p+len) / 10;
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:274:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(tempstr,"%.1f",valf);
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:280:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(t,"\nUseFixes");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:289:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(t,"\nCfgFixes");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:291:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					val = atoi(p + len);
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:296:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(tempstr, "checkFix%d", i+1);
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:340:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char * p, *ps, *pC;char t[32];
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:342:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(t,"%d",val);
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:363:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(pB," = ");
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:372:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cfg[255];
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:373:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tempstr[50];
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:383:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  in = fopen(cfg,READBINARY);
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:435:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(tempstr, "checkFix%d", i+1);
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:444:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 if((in=fopen(cfg, WRITEBINARY))!=NULL)
data/pcsxr-1.9.94/plugins/dfxvideo/menu.c:108:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(szMenuBuf,"   FL   FS   DI   GF        ");     // main menu items
data/pcsxr-1.9.94/plugins/dfxvideo/soft.c:206:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char dithertable[16] =
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char *pB, *p, t[256];
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:42:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  in = fopen(pConfigFile, "rb");
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:44:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  in = fopen("gpuPeopsMesaGL.cfg", "rb"); 
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:54:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nResX");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:55:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) iResX=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:58:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nResY");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:59:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) iResY=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:62:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nKeepRatio");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:63:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) bKeepRatio=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:67:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nForceRatio43");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:68:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) bForceRatio43=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:72:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nScreenSmoothing");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:73:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) iBlurBuffer=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:77:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nHiResTextures");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:78:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) iHiResTextures=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:83:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nVRamSize");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:84:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) iVRamSize=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:88:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nFullScreen");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:89:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) bFullScreen=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:92:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nScanLines");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:93:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) iUseScanLines=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:97:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nScanLinesBlend");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:98:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) iScanBlend=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:102:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nFrameTextures");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:103:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) iFrameTexType=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:107:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nFrameAccess");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:108:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) iFrameReadType=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:114:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nTexFilter");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:115:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) iFilterType=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:119:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nAdvancedBlend");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:120:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) bAdvancedBlend=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:124:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nDithering");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:125:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) bDrawDither=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:129:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nLineMode");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:130:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) bUseLines=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:134:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nShowFPS");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:135:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) iShowFPS=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:139:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nUseFrameLimit");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:140:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) bUseFrameLimit=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:144:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nUseFrameSkip");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:145:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) bUseFrameSkip=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:149:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nFPSDetection");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:150:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) iFrameLimit=atoi(p+len)+1;
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:154:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nFrameRate");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:159:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nOffscreenDrawing");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:160:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) iOffscreenDrawing=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:164:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nOpaquePass");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:165:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) bOpaquePass=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:169:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nAntiAlias");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:170:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) bUseAntiAlias=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:174:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nTexQuality");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:175:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) iTexQuality=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:179:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\n15bitMdec");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:180:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) bUse15bitMdec=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:184:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nMaskDetect");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:185:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) iUseMask=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:189:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nFastMdec");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:190:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) bUseFastMdec=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:194:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nCfgFixes");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:195:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) dwCfgFixes=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:197:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nUseFixes");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:198:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) bUseFixes=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:202:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nOGLExtensions");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:203:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) iUseExts=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:206:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(t,"\nGteAccuracy");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;}
data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:207:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) bGteAccuracy=atoi(p+len);
data/pcsxr-1.9.94/plugins/peopsxgl/externals.h:192:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char col[4];
data/pcsxr-1.9.94/plugins/peopsxgl/externals.h:199:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char  c[2];
data/pcsxr-1.9.94/plugins/peopsxgl/externals.h:205:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char c[4];
data/pcsxr-1.9.94/plugins/peopsxgl/externals.h:249:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern unsigned char  gl_ux[8];
data/pcsxr-1.9.94/plugins/peopsxgl/externals.h:250:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern unsigned char  gl_vy[8];
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:135:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char            szDispBuf[64];
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:222:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char szO[2][4]={"off","on "};
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:223:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char szTxt[256];
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:264:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(szTxt,"Resolution/Color:\r\n- %dx%d ",LOWORD(iWinSize),HIWORD(iWinSize));
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:266:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(szTxt,"Resolution/Color:\r\n- %dx%d ",iResX,iResY);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:268:18:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 if(bWindowMode) sprintf(szTxt,"Window mode\r\n");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:271:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(szTxt,"Fullscreen ");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:273:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   if(bChangeRes) sprintf(szTxt,"- Desktop changing [%d Bit]\r\n",iColDepth);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:274:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   else           sprintf(szTxt,"- NO desktop changing\r\n");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:279:21:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 else               strcpy(szTxt,"- V-Sync: Driver\r\n");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:284:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 strcpy(szTxt,"Textures:\r\n- ");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:285:26:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
 if(iTexQuality==0)      strcat(szTxt,"Default");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:286:26:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
 else if(iTexQuality==1) strcat(szTxt,"R4G4B4A4");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:287:26:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
 else if(iTexQuality==2) strcat(szTxt,"R5G5B5A1");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:288:26:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
 else if(iTexQuality==3) strcat(szTxt,"R8G8A8A8");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:289:26:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
 else if(iTexQuality==4) strcat(szTxt,"B8G8R8A8");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:290:20:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
 if(!hW && bGLExt) strcat(szTxt," (packed pixels)\r\n");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:291:20:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
 else              strcat(szTxt,"\r\n");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:295:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(szTxt,"- Filtering: %d - edge clamping ",iFilterType);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:296:37:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   if(iClampType==GL_TO_EDGE_CLAMP) strcat(szTxt,"supported\r\n");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:297:37:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   else                             strcat(szTxt,"NOT supported\r\n");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:299:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 else sprintf(szTxt,"- iFiltering: %d\r\n",iFilterType);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:301:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(szTxt,"- Hi-Res textures: %d\r\n",iHiResTextures);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:308:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(szTxt,"- VRam size: %d MBytes",iVRamSize);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:310:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(szTxt+strlen(szTxt)," - %d textures usable\r\n\r\n",iSortTexCnt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:311:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
 else strcat(szTxt,"\r\n\r\n");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:319:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(szTxt,"- FPS limit: Auto\r\n\r\n");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:320:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 else sprintf(szTxt,"- FPS limit: %.1f\r\n\r\n",fFrameRate);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:323:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(szTxt,"Compatibility:\r\n- Offscreen drawing: %d\r\n",iOffscreenDrawing);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:325:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(szTxt,"- Framebuffer texture: %d",iFrameTexType);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:328:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   if(gTexFrameName) strcat(szTxt," - texture created\r\n");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:329:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   else              strcat(szTxt," - not used yet\r\n");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:331:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
 else strcat(szTxt,"\r\n");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:333:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(szTxt,"- Framebuffer access: %d\r\n",iFrameReadType);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:342:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   if(bGLBlend) strcat(szTxt," (hardware)\r\n");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:343:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   else         strcat(szTxt," (software)\r\n");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:345:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
 else strcat(szTxt,"\r\n");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:350:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(szTxt,"- Subtractive blending: ");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:353:24:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
     if(bUseMultiPass) strcat(szTxt,"supported, but not used!");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:354:24:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
     else              strcat(szTxt,"activated");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:356:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   else strcat(szTxt," NOT supported!");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:357:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(szTxt,"\r\n\r\n");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:359:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 else strcpy(szTxt,"\r\n");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:365:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 if(iUseScanLines) sprintf(szTxt," [%d]\r\n",iScanBlend);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:366:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
 else strcpy(szTxt,"\r\n");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:382:21:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   if(gTexBlurName) strcat(pB," - supported\r\n");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:383:21:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   else             strcat(pB," - not supported\r\n");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:385:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
 else strcat(pB,"\r\n");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:398:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 FILE *txtfile;char szTxt[256];char * pB;
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:401:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(szTxt,"snap\\pcsxr%04d.txt",iNum);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:406:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 if((txtfile=fopen(szTxt,"wb"))==NULL)
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:425:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 FILE *bmpfile;char filename[256];
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:426:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char header[0x36];int size;
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:427:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char empty[2]={0,0};int i;
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:470:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(filename,"snap/pcsxr%04d.bmp",snapshotnr);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:474:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   bmpfile=fopen(filename,"rb");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:482:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
 if((bmpfile=fopen(filename,"wb"))==NULL)
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:792:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 int myscreen;char gammastr[14];
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:808:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(gammastr,"SST_GAMMA=%2.1f",fxgamma);      // -> set gamma
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:1552:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(szDispBuf,"%06.1f",fps_cur);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:2792:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const unsigned char primTableCX[256] =
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3015:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cfg[256];
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3018:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(cfg, "./cfgpeopsxgl");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3032:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(cfg, "./cfg/cfgpeopsxgl");
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3178:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char psxVRam[1024*1024*2]; // current VRam image (full 2 MB for ZN)
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3200:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pF->ulControl,ulStatusControl,256*sizeof(uint32_t));
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3201:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pF->psxVRam,  psxVub,         1024*iGPUHeight*2);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3209:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 memcpy(ulStatusControl,pF->ulControl,256*sizeof(uint32_t));
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3210:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 memcpy(psxVub,         pF->psxVRam,  1024*iGPUHeight*2);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3236:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char cFont[10][120]=
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:74:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    out = fopen( "gpuPeopsMesaGL.cfg", "w+" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:235:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char t[256];
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:343:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		in = fopen( "gpuPeopsMesaGL.cfg", "rb" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:354:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nResX" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:359:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:366:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nResY" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:371:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:378:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nKeepRatio" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:383:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:390:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nForceRatio43" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:395:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:402:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nDithering" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:407:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:414:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nFullScreen" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:419:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:426:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nTexQuality" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:431:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:438:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nTexFilter" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:443:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:450:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nHiResTextures" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:455:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:462:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(t,"\nVRamSize");
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:467:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:474:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nShowFPS" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:479:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:486:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nUseFrameLimit" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:491:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:498:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nFPSDetection" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:503:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:510:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(t,"\nFrameRate");
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:515:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:522:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nUseFrameSkip" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:527:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:534:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nOffscreenDrawing" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:539:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:546:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nFrameTextures" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:551:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:558:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nFrameAccess" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:563:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:570:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nMaskDetect" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:575:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:582:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nOpaquePass" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:587:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:594:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nAdvancedBlend" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:599:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:606:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nScanLines" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:611:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:618:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(t,"\nScanLinesBlend");
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:623:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:630:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nFastMdec" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:635:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:642:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\n15bitMdec" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:647:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:654:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nLineMode" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:659:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:666:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nAntiAlias" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:671:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:678:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nOGLExtensions" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:683:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:690:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nScreenSmoothing" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:695:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:702:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nGteAccuracy" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:707:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:714:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nUseFixes" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:719:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:726:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy( t, "\nCfgFixes" );
data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:731:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				val = atoi( p + len );
data/pcsxr-1.9.94/plugins/peopsxgl/menu.c:1438:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char szB[256];
data/pcsxr-1.9.94/plugins/peopsxgl/prim.c:3164:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 static unsigned char pFF9G4Cache[32];
data/pcsxr-1.9.94/plugins/peopsxgl/prim.c:3175:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
       memcpy(pFF9G4Cache,baseAddr,32);
data/pcsxr-1.9.94/plugins/peopsxgl/soft.c:200:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char dithertable[16] =
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:59:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char		szDescr[256], szCode[1024];
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:78:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(szDescr, "%.8X %.4X\r\n", CheatCodes[i].Addr, CheatCodes[i].Val);
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			szFileName[256];
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:161:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			szFileTitle[256];
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:162:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			szFilter[256];
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:282:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy(szFilter, _("PCSXR Cheat Code Files"));
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:311:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
					strcpy(szFilter, _("PCSXR Cheat Code Files"));
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:392:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[256];
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:435:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf, "%X", current_valuefrom);
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:437:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf, "%X", current_valueto);
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:441:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf, "%u", current_valuefrom);
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:443:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf, "%u", current_valueto);
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:466:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
						sprintf(buf, _("%.8X    Current: %u (%.2X), Previous: %u (%.2X)"),
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:471:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
						sprintf(buf, _("%.8X    Current: %u (%.4X), Previous: %u (%.4X)"),
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:476:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
						sprintf(buf, _("%.8X    Current: %u (%.8X), Previous: %u (%.8X)"),
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:492:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, _("Founded Addresses: %d"), NumSearchResults);
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:500:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[256];
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:508:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buf, "%.8X", SearchResults[iCurItem]);
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:529:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buf, "%u", val);
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:545:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
							sprintf(szCode, "%.8X %.4X", (SearchResults[iCurItem] & 0x1FFFFF) | (CHEAT_CONST8 << 24), val);
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:552:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
							sprintf(szCode, "%.8X %.4X", (SearchResults[iCurItem] & 0x1FFFFF) | (CHEAT_CONST16 << 24), val);
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:556:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
							sprintf(szCode, "%.8X %.4X\n%.8X %.4X",
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:566:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(szDescr, _("Freeze %.8X"), SearchResults[iCurItem]);
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:591:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[256];
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:599:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buf, "%.8X", SearchResults[iCurItem]);
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:620:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buf, "%u", val);
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:673:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buf[256];
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:720:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(buf, "%.8X", SearchResults[i]);
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:974:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
							sprintf(buf, "%u", i);
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:979:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
							sprintf(buf, "%u", i);
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:986:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
						sprintf(buf, "%X", i);
data/pcsxr-1.9.94/win32/gui/CheatDlg.c:991:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
						sprintf(buf, "%X", i);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[256];
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:178:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmpStr[256];
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:183:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(tmpStr, "*.dll");
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:239:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(lp, "HLE");
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:368:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char file[256]; \
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:444:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char file[256]; \
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:495:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Buffer[256];
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:516:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Path[256];
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:525:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Path[256];
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:628:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmpStr[256];
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:633:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(tmpStr, "*.dll");
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:637:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(lp, "Disabled");
data/pcsxr-1.9.94/win32/gui/NoPic.h:11:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char cFont[10][120]=
data/pcsxr-1.9.94/win32/gui/NoPic.h:300:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char	 pixel_data[128 * 96 * 3 + 1];
data/pcsxr-1.9.94/win32/gui/Win32.h:35:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char cfgfile[256];
data/pcsxr-1.9.94/win32/gui/Win32.h:38:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char PcsxrDir[256];
data/pcsxr-1.9.94/win32/gui/WndMain.c:51:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cfgfile[256];
data/pcsxr-1.9.94/win32/gui/WndMain.c:54:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char PcsxrDir[256];
data/pcsxr-1.9.94/win32/gui/WndMain.c:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lang[256];
data/pcsxr-1.9.94/win32/gui/WndMain.c:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			id[8];
data/pcsxr-1.9.94/win32/gui/WndMain.c:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			name[64];
data/pcsxr-1.9.94/win32/gui/WndMain.c:124:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(Config.Lang, "English");
data/pcsxr-1.9.94/win32/gui/WndMain.c:136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cdfile[MAXPATHLEN] = "", buf[4096];
data/pcsxr-1.9.94/win32/gui/WndMain.c:139:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(cfgfile, "Software\\Pcsxr");
data/pcsxr-1.9.94/win32/gui/WndMain.c:153:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(Config.Net, "Disabled");
data/pcsxr-1.9.94/win32/gui/WndMain.c:156:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(Config.PluginsDir, "Plugins\\");
data/pcsxr-1.9.94/win32/gui/WndMain.c:157:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(Config.BiosDir,    "Bios\\");
data/pcsxr-1.9.94/win32/gui/WndMain.c:159:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(Config.Mcd1, "memcards\\Mcd001.mcr");
data/pcsxr-1.9.94/win32/gui/WndMain.c:160:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(Config.Mcd2, "memcards\\Mcd002.mcr");
data/pcsxr-1.9.94/win32/gui/WndMain.c:166:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char text[256];
data/pcsxr-1.9.94/win32/gui/WndMain.c:180:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(Config.PatchesDir, "Patches\\");
data/pcsxr-1.9.94/win32/gui/WndMain.c:275:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[256];
data/pcsxr-1.9.94/win32/gui/WndMain.c:300:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Text[256];
data/pcsxr-1.9.94/win32/gui/WndMain.c:310:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		 sprintf(Text, _("*PCSXR*: Loaded State %d"), num+1);
data/pcsxr-1.9.94/win32/gui/WndMain.c:311:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	else sprintf(Text, _("*PCSXR*: Error Loading State %d"), num+1);
data/pcsxr-1.9.94/win32/gui/WndMain.c:320:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Text[256];
data/pcsxr-1.9.94/win32/gui/WndMain.c:332:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		 sprintf(Text, _("*PCSXR*: Saved State %d"), num+1);
data/pcsxr-1.9.94/win32/gui/WndMain.c:333:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	else sprintf(Text, _("*PCSXR*: Error Saving State %d"), num+1);
data/pcsxr-1.9.94/win32/gui/WndMain.c:343:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szFileName[MAXPATHLEN];
data/pcsxr-1.9.94/win32/gui/WndMain.c:344:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szFileTitle[MAXPATHLEN];
data/pcsxr-1.9.94/win32/gui/WndMain.c:345:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szFilter[256];
data/pcsxr-1.9.94/win32/gui/WndMain.c:351:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(szFilter, _("PCSXR State Format"));
data/pcsxr-1.9.94/win32/gui/WndMain.c:370:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char Text[256];
data/pcsxr-1.9.94/win32/gui/WndMain.c:389:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szFileName[MAXPATHLEN];
data/pcsxr-1.9.94/win32/gui/WndMain.c:390:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szFileTitle[MAXPATHLEN];
data/pcsxr-1.9.94/win32/gui/WndMain.c:391:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szFilter[256];
data/pcsxr-1.9.94/win32/gui/WndMain.c:397:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(szFilter, _("PCSXR State Format"));
data/pcsxr-1.9.94/win32/gui/WndMain.c:416:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char Text[256];
data/pcsxr-1.9.94/win32/gui/WndMain.c:434:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char File[256];
data/pcsxr-1.9.94/win32/gui/WndMain.c:852:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mask[16*16];
data/pcsxr-1.9.94/win32/gui/WndMain.c:974:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/pcsxr-1.9.94/win32/gui/WndMain.c:975:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buftitle[256];
data/pcsxr-1.9.94/win32/gui/WndMain.c:1091:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[256];
data/pcsxr-1.9.94/win32/gui/WndMain.c:1135:30:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			if (!strlen(Config.Mcd1)) strcpy(Config.Mcd1, "memcards\\Mcd001.mcr");
data/pcsxr-1.9.94/win32/gui/WndMain.c:1136:30:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			if (!strlen(Config.Mcd2)) strcpy(Config.Mcd2, "memcards\\Mcd002.mcr");
data/pcsxr-1.9.94/win32/gui/WndMain.c:1179:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(Mcd1Data + (i+1) * 128, Mcd2Data + (copy+1) * 128, 128);
data/pcsxr-1.9.94/win32/gui/WndMain.c:1181:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(Mcd1Data + (i+1) * 1024 * 8, Mcd2Data + (copy+1) * 1024 * 8, 1024 * 8);
data/pcsxr-1.9.94/win32/gui/WndMain.c:1188:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(Mcd2Data + (i+1) * 128, Mcd1Data + (copy+1) * 128, 128);
data/pcsxr-1.9.94/win32/gui/WndMain.c:1190:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(Mcd2Data + (i+1) * 1024 * 8, Mcd1Data + (copy+1) * 1024 * 8, 1024 * 8);
data/pcsxr-1.9.94/win32/gui/WndMain.c:1467:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szFileName[MAXPATHLEN];
data/pcsxr-1.9.94/win32/gui/WndMain.c:1468:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szFileTitle[MAXPATHLEN];
data/pcsxr-1.9.94/win32/gui/WndMain.c:1469:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szFilter[1024];
data/pcsxr-1.9.94/win32/gui/WndMain.c:1476:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(szFilter, _("Psx Mcd Format (*.mcr;*.mc;*.mem;*.vgs;*.mcd;*.gme;*.ddf)"));
data/pcsxr-1.9.94/win32/gui/WndMain.c:1478:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(str, "*.mcr;*.mcd;*.mem;*.gme;*.mc;*.ddf");
data/pcsxr-1.9.94/win32/gui/WndMain.c:1481:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(str, _("Psx Memory Card (*.mcr;*.mc)"));
data/pcsxr-1.9.94/win32/gui/WndMain.c:1483:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(str, "*.mcr;0*.mc");
data/pcsxr-1.9.94/win32/gui/WndMain.c:1486:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(str, _("CVGS Memory Card (*.mem;*.vgs)"));
data/pcsxr-1.9.94/win32/gui/WndMain.c:1488:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(str, "*.mem;*.vgs");
data/pcsxr-1.9.94/win32/gui/WndMain.c:1491:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(str, _("Bleem Memory Card (*.mcd)"));
data/pcsxr-1.9.94/win32/gui/WndMain.c:1493:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(str, "*.mcd");
data/pcsxr-1.9.94/win32/gui/WndMain.c:1496:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(str, _("DexDrive Memory Card (*.gme)"));
data/pcsxr-1.9.94/win32/gui/WndMain.c:1498:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(str, "*.gme");
data/pcsxr-1.9.94/win32/gui/WndMain.c:1501:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(str, _("DataDeck Memory Card (*.ddf)"));
data/pcsxr-1.9.94/win32/gui/WndMain.c:1503:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(str, "*.ddf");
data/pcsxr-1.9.94/win32/gui/WndMain.c:1506:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(str, _("All Files"));
data/pcsxr-1.9.94/win32/gui/WndMain.c:1508:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(str, "*.*");
data/pcsxr-1.9.94/win32/gui/WndMain.c:1534:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szFileName[MAXPATHLEN];
data/pcsxr-1.9.94/win32/gui/WndMain.c:1535:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szFileTitle[MAXPATHLEN];
data/pcsxr-1.9.94/win32/gui/WndMain.c:1536:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szFilter[256];
data/pcsxr-1.9.94/win32/gui/WndMain.c:1545:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(szFilter, _("Psx Exe Format"));
data/pcsxr-1.9.94/win32/gui/WndMain.c:1570:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szFileName[MAXPATHLEN];
data/pcsxr-1.9.94/win32/gui/WndMain.c:1571:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szFileTitle[MAXPATHLEN];
data/pcsxr-1.9.94/win32/gui/WndMain.c:1572:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char szFilter[256];
data/pcsxr-1.9.94/win32/gui/WndMain.c:1582:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(szFilter, _("Psx Isos (*.iso;*.mdf;*.img;*.bin;*.cue;*.pbp;*.cbn)"));
data/pcsxr-1.9.94/win32/gui/WndMain.c:1584:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(str, "*.iso;*.mdf;*.img;*.bin;*.cue;*.pbp;*.cbn");
data/pcsxr-1.9.94/win32/gui/WndMain.c:1587:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(str, _("All Files"));
data/pcsxr-1.9.94/win32/gui/WndMain.c:1589:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(str, "*.*");
data/pcsxr-1.9.94/win32/gui/WndMain.c:1646:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/pcsxr-1.9.94/win32/gui/WndMain.c:1706:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(langs[0].lang, "English");
data/pcsxr-1.9.94/win32/gui/WndMain.c:1836:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	emuLog = fopen("emuLog.txt","w");
data/pcsxr-1.9.94/win32/gui/WndMain.c:1869:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[512];
data/pcsxr-1.9.94/win32/gui/WndMain.c:1888:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[512];
data/pcsxr-1.9.94/win32/gui/plugin.c:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Text[255];
data/pcsxr-1.9.94/win32/gui/plugin.c:59:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(pMem, NoPic_Image.pixel_data, 128*96*3);
data/pcsxr-1.9.94/win32/gui/plugin.c:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char trimlabel[33];
data/pcsxr-1.9.94/win32/gui/plugin.c:79:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(out, "sstates\\%.32s-%.9s.%3.3d", trimlabel, CdromId, i);
data/pcsxr-1.9.94/win32/gui/plugin.c:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Text[255];
data/pcsxr-1.9.94/win32/gui/plugin.c:94:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				 sprintf(Text, _("*PCSXR*: Saved State %d"), StatesC+1);
data/pcsxr-1.9.94/win32/gui/plugin.c:95:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			else sprintf(Text, _("*PCSXR*: Error Saving State %d"), StatesC+1);
data/pcsxr-1.9.94/win32/gui/plugin.c:111:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				 sprintf(Text, _("*PCSXR*: Loaded State %d"), StatesC+1);
data/pcsxr-1.9.94/win32/gui/plugin.c:112:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			else sprintf(Text, _("*PCSXR*: Error Loading State %d"), StatesC+1);
data/pcsxr-1.9.94/win32/gui/plugin.c:123:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				 sprintf(Text, _("*PCSXR*: Sio Irq Always Enabled"));
data/pcsxr-1.9.94/win32/gui/plugin.c:124:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			else sprintf(Text, _("*PCSXR*: Sio Irq Not Always Enabled"));
data/pcsxr-1.9.94/win32/gui/plugin.c:131:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				 sprintf(Text, _("*PCSXR*: Black&White Mdecs Only Enabled"));
data/pcsxr-1.9.94/win32/gui/plugin.c:132:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			else sprintf(Text, _("*PCSXR*: Black&White Mdecs Only Disabled"));
data/pcsxr-1.9.94/win32/gui/plugin.c:139:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				 sprintf (Text, _("*PCSXR*: Xa Enabled"));
data/pcsxr-1.9.94/win32/gui/plugin.c:140:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			else sprintf (Text, _("*PCSXR*: Xa Disabled"));
data/pcsxr-1.9.94/win32/gui/plugin.c:174:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char charsTable[4] = { "|/-\\" };
data/pcsxr-1.9.94/win32/gui/plugin.c:177:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[256];
data/pcsxr-1.9.94/win32/gui/plugin.c:184:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(str, _("Please wait while connecting... %c\n"), charsTable[waitState]);
data/pcsxr-1.9.94/win32/gui/plugin.c:191:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(str, _("Please wait while connecting... %c\n"), charsTable[waitState]);
data/pcsxr-1.9.94/win32/gui/plugin.c:224:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char path[256];
data/pcsxr-1.9.94/win32/intl/bindtextdom.c:34:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
# ifndef memcpy
data/pcsxr-1.9.94/win32/intl/bindtextdom.c:35:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#  define memcpy(Dst, Src, Num) bcopy (Src, Dst, Num)
data/pcsxr-1.9.94/win32/intl/bindtextdom.c:35:33:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#  define memcpy(Dst, Src, Num) bcopy (Src, Dst, Num)
data/pcsxr-1.9.94/win32/intl/bindtextdom.c:95:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (dirname_MOD, dirname, len1);
data/pcsxr-1.9.94/win32/intl/bindtextdom.c:155:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy (new_dirname, dirname, len);
data/pcsxr-1.9.94/win32/intl/bindtextdom.c:192:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (new_binding->domainname, domainname, len);
data/pcsxr-1.9.94/win32/intl/bindtextdom.c:212:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (new_binding->dirname, dirname, len);
data/pcsxr-1.9.94/win32/intl/finddomain.c:40:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
# ifndef memcpy
data/pcsxr-1.9.94/win32/intl/finddomain.c:41:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#  define memcpy(Dst, Src, Num) bcopy (Src, Dst, Num)
data/pcsxr-1.9.94/win32/intl/finddomain.c:41:33:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#  define memcpy(Dst, Src, Num) bcopy (Src, Dst, Num)
data/pcsxr-1.9.94/win32/intl/finddomain.c:154:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (locale, alias_value, len);
data/pcsxr-1.9.94/win32/intl/gettext.c:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[16384];
data/pcsxr-1.9.94/win32/intl/gettext.c:70:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char bufout[16384];
data/pcsxr-1.9.94/win32/intl/l10nflist.c:28:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
# ifndef memcpy
data/pcsxr-1.9.94/win32/intl/l10nflist.c:29:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#  define memcpy(Dst, Src, Num) bcopy (Src, Dst, Num)
data/pcsxr-1.9.94/win32/intl/l10nflist.c:29:33:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#  define memcpy(Dst, Src, Num) bcopy (Src, Dst, Num)
data/pcsxr-1.9.94/win32/intl/l10nflist.c:223:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (abs_filename, dirlist, dirlist_len);
data/pcsxr-1.9.94/win32/intl/loadmsgcat.c:52:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
# define open   __open
data/pcsxr-1.9.94/win32/intl/loadmsgcat.c:93:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open (domain_file->filename, O_RDONLY | O_BINARY); /*FRANCO -  binary*/
data/pcsxr-1.9.94/win32/intl/localealias.c:60:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
# ifndef memcpy
data/pcsxr-1.9.94/win32/intl/localealias.c:61:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#  define memcpy(Dst, Src, Num) bcopy (Src, Dst, Num)
data/pcsxr-1.9.94/win32/intl/localealias.c:61:33:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#  define memcpy(Dst, Src, Num) bcopy (Src, Dst, Num)
data/pcsxr-1.9.94/win32/intl/localealias.c:236:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (full_fname, fname, fname_len);
data/pcsxr-1.9.94/win32/intl/localealias.c:237:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&full_fname[fname_len], aliasfile, sizeof aliasfile);
data/pcsxr-1.9.94/win32/intl/localealias.c:240:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen (full_fname, "r");
data/pcsxr-1.9.94/win32/intl/localealias.c:255:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      unsigned char buf[BUFSIZ];
data/pcsxr-1.9.94/win32/intl/localealias.c:268:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  char altbuf[BUFSIZ];
data/pcsxr-1.9.94/win32/intl/localealias.c:338:26:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      map[nmap].alias = memcpy (&string_space[string_space_act],
data/pcsxr-1.9.94/win32/intl/localealias.c:342:26:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      map[nmap].value = memcpy (&string_space[string_space_act],
data/pcsxr-1.9.94/win32/intl/textdomain.c:29:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
# ifndef memcpy
data/pcsxr-1.9.94/win32/intl/textdomain.c:30:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#  define memcpy(Dst, Src, Num) bcopy (Src, Dst, Num)
data/pcsxr-1.9.94/win32/intl/textdomain.c:30:33:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#  define memcpy(Dst, Src, Num) bcopy (Src, Dst, Num)
data/pcsxr-1.9.94/win32/intl/textdomain.c:92:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (cp, domainname, len);
data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:510:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[64];
data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:514:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy (buff, "NONE");
data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:651:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buff[64];
data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:880:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy (buf, cmd40, sizeof (cmd40));
data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:884:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy (buf, cmd41, sizeof (cmd41));
data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:928:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy (buf, cmd44, sizeof (cmd44));
data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:932:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy (buf, cmd45, sizeof (cmd45));
data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:937:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy (buf, cmd46, sizeof (cmd46));
data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:941:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy (buf, cmd47, sizeof (cmd47));
data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:945:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy (buf, cmd4c, sizeof (cmd4c));
data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:949:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy (buf, cmd4d, sizeof (cmd4d));
data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:955:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy (buf, cmd4f, sizeof (cmd4f));
data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:1054:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char reserved[91];
data/pcsxr-1.9.94/win32/plugins/bladesio1/winsrc/cfg-winapi.c:34:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(settings.ip, "127.0.0.1");
data/pcsxr-1.9.94/win32/plugins/bladesio1/winsrc/cfg-winapi.c:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[32];
data/pcsxr-1.9.94/win32/plugins/bladesio1/winsrc/cfg-winapi.c:77:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(str, "%i", settings.port);
data/pcsxr-1.9.94/win32/plugins/bladesio1/winsrc/cfg-winapi.c:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[32];
data/pcsxr-1.9.94/win32/plugins/bladesio1/winsrc/cfg-winapi.c:94:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	settings.port = atoi(str);
data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/debug.c:146:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 HDC hdc;RECT r;HBRUSH hBO;char szB[16];
data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/debug.c:222:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 int ch=iSelChannel;char szB[16];
data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/record.c:48:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     szFileName[256];
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:29:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char szKeyDefaults[11]={VK_DELETE,VK_INSERT,VK_HOME,VK_END,VK_PRIOR,VK_NEXT,VK_MULTIPLY,VK_SUBTRACT,VK_ADD,VK_F12,0x00};
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:30:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char szDevName[128];
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:107:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 HWND hWC;char cs[256];int i;DEVMODE dv;
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:209:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(cs,"%.1f",fFrameRate);
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:221:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 HWND hWC;char cs[256];int i,j;char * p;
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:226:8:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 iResX=atol(cs);
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:228:8:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 iResY=atol(p+1);
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:230:21:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) iRefreshRate=atol(p+1);						   // get refreshrate
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:236:12:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 iColDepth=atol(cs);
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:393:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char buffer[255];
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:395:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char chFCC[5];
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:401:1:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
strcpy(fcc.chFCC,"VIDC");
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:482:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(RECORD_COMPRESSION_STATE1,RECORD_COMPRESSION1.lpState,RECORD_COMPRESSION1.cbState);
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:499:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(RECORD_COMPRESSION_STATE2,RECORD_COMPRESSION2.lpState,RECORD_COMPRESSION2.cbState);
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:1173:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char szName[10];
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:1235:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     int i,j,k;char szB[2];HWND hWC;
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/ddraw.h:1214:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    szDriver[MAX_DDDEVICEID_STRING];
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/ddraw.h:1215:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    szDescription[MAX_DDDEVICEID_STRING];
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/ddraw.h:1225:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    szDriver[MAX_DDDEVICEID_STRING];	/* user readable driver name */
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/ddraw.h:1226:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    szDescription[MAX_DDDEVICEID_STRING]; /* user readable description */
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/draw.c:4260:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char szB[256];
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/key.c:35:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char                   szGPUKeys[11];
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.c:26:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char		RECORD_BUFFER[1600*1200*3];
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.c:35:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char		RECORD_COMPRESSION_STATE1[4096];
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.c:37:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char		RECORD_COMPRESSION_STATE2[4096];
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.c:55:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char filename[255];
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.c:61:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(filename,"demo\\demo%04d.AVI",RECORD_INDEX++);
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.c:62:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if((data=fopen(filename,"rb"))==NULL) break;
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.c:66:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
if((data=fopen(filename,"wb"))==NULL) goto error;
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.h:38:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern unsigned char	RECORD_BUFFER[1600*1200*3];
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.h:47:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern unsigned char	RECORD_COMPRESSION_STATE1[4096];
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.h:49:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern unsigned char	RECORD_COMPRESSION_STATE2[4096];
data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c:30:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char szKeyDefaults[7]={VK_DELETE,VK_INSERT,VK_HOME,VK_END,VK_PRIOR,VK_NEXT,0x00};
data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c:87:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 HWND hWC;char cs[256];int i;DEVMODE dv;
data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c:244:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
 sprintf(cs,"%.2f",fFrameRate);
data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c:257:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 HWND hWC;char cs[256];int i,j;char * p;
data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c:261:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 iVRamSize=atoi(cs);
data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c:268:8:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 iResX=atol(cs);
data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c:270:14:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 if(p) iResY=atol(p+1);
data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c:276:12:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
 iColDepth=atol(cs);
data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c:907:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char szName[10];
data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c:971:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     int i,j,k;char szB[2];HWND hWC;
data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/key.c:44:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char            szGPUKeys[7];
data/pcsxr-1.9.94/win32/zlib/gzio.c:87:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fmode[80]; /* copy of mode, without the compression level */
data/pcsxr-1.9.94/win32/zlib/gzio.c:202:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[20];
data/pcsxr-1.9.94/win32/zlib/gzio.c:205:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(name, "<fd:%d>", fd); /* for debugging */
data/pcsxr-1.9.94/win32/zlib/gzio.c:531:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[Z_PRINTF_BUFSIZE];
data/pcsxr-1.9.94/win32/zlib/gzio.c:556:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[Z_PRINTF_BUFSIZE];
data/pcsxr-1.9.94/win32/zlib/gzio.c:876:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(s->msg, ": ");
data/pcsxr-1.9.94/win32/zlib/trees.c:333:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *header = fopen("trees.h", "w");
data/pcsxr-1.9.94/win32/zlib/zutil.c:16:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *z_errmsg[10] = {
data/pcsxr-1.9.94/win32/zlib/zutil.h:40:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char *z_errmsg[10]; /* indexed by 2-zlib_error */
data/pcsxr-1.9.94/win32/zlib/zutil.h:102:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     fopen((name), (mode), "mbc=60", "ctx=stm", "rfm=fix", "mrs=512")
data/pcsxr-1.9.94/win32/zlib/zutil.h:148:30:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#  define F_OPEN(name, mode) fopen((name), (mode))
data/pcsxr-1.9.94/win32/zlib/zutil.h:179:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#    define zmemcpy memcpy
data/pcsxr-1.9.94/gui/ConfDlg.c:71:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(conf) > 0) { \
data/pcsxr-1.9.94/gui/ConfDlg.c:123:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(Config.PluginsDir) == 0) {
data/pcsxr-1.9.94/gui/ConfDlg.c:363:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((strlen(Config.Gpu) != 0) &&
data/pcsxr-1.9.94/gui/ConfDlg.c:364:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(strlen(Config.Spu) != 0) &&
data/pcsxr-1.9.94/gui/ConfDlg.c:365:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(strlen(Config.Cdr) != 0) &&
data/pcsxr-1.9.94/gui/ConfDlg.c:367:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(strlen(Config.Sio1) != 0) &&
data/pcsxr-1.9.94/gui/ConfDlg.c:369:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(strlen(Config.Pad1) != 0) &&
data/pcsxr-1.9.94/gui/ConfDlg.c:370:4:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(strlen(Config.Pad2) != 0))
data/pcsxr-1.9.94/gui/ConfDlg.c:388:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(plugin) > 0) { \
data/pcsxr-1.9.94/gui/Config.c:35:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	tmp += strlen(name); 
data/pcsxr-1.9.94/gui/Config.c:48:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tmp += strlen(name);
data/pcsxr-1.9.94/gui/Config.c:58:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tmp += strlen(name);
data/pcsxr-1.9.94/gui/Config.c:84:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(cfgfile, getenv("HOME"), 200);
data/pcsxr-1.9.94/gui/DebugMemory.c:267:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int r = strlen(p);
data/pcsxr-1.9.94/gui/GtkGui.c:230:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(trimlabel, CdromLabel, 32);
data/pcsxr-1.9.94/gui/GtkGui.c:671:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	} else if (strlen(Config.IsoImgDir) <= 0) {
data/pcsxr-1.9.94/gui/GtkGui.c:721:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		  strncpy(current_folder, filename, strrchr(filename, '/') - filename);
data/pcsxr-1.9.94/gui/GtkGui.c:1082:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (msg[strlen(msg) - 1] == '\n')
data/pcsxr-1.9.94/gui/GtkGui.c:1083:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		msg[strlen(msg) - 1] = 0;
data/pcsxr-1.9.94/gui/LnxMain.c:269:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(plugin_name) != 0) {
data/pcsxr-1.9.94/gui/LnxMain.c:305:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(cfgfile_basename, argv[++i], MAXPATHLEN-100);	/* TODO buffer overruns */
data/pcsxr-1.9.94/gui/LnxMain.c:312:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(isofilename, argv[++i], MAXPATHLEN);
data/pcsxr-1.9.94/gui/LnxMain.c:316:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (strlen(path) + strlen(isofilename) + 1 < MAXPATHLEN) {
data/pcsxr-1.9.94/gui/LnxMain.c:316:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (strlen(path) + strlen(isofilename) + 1 < MAXPATHLEN) {
data/pcsxr-1.9.94/gui/LnxMain.c:317:6:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
					strcat(path, "/");
data/pcsxr-1.9.94/gui/LnxMain.c:345:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(file, argv[i], MAXPATHLEN);
data/pcsxr-1.9.94/gui/LnxMain.c:348:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (strlen(path) + strlen(file) + 1 < MAXPATHLEN) {
data/pcsxr-1.9.94/gui/LnxMain.c:348:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (strlen(path) + strlen(file) + 1 < MAXPATHLEN) {
data/pcsxr-1.9.94/gui/LnxMain.c:349:6:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
					strcat(path, "/");
data/pcsxr-1.9.94/gui/LnxMain.c:523:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int l = strlen(msg);
data/pcsxr-1.9.94/gui/MemcardDlg.c:162:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		title = g_convert(Info->sTitle, strlen(Info->sTitle), "UTF-8",
data/pcsxr-1.9.94/gui/MemcardDlg.c:257:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		title = g_convert(Info->sTitle, strlen(Info->sTitle), "UTF-8",
data/pcsxr-1.9.94/gui/MemcardDlg.c:322:22:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			if (memcard == 1) strncpy(Config.Mcd1, filename, MAXPATHLEN);
data/pcsxr-1.9.94/gui/MemcardDlg.c:323:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			else strncpy(Config.Mcd2, filename, MAXPATHLEN);
data/pcsxr-1.9.94/gui/MemcardDlg.c:393:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		if (mcd == 1) strncpy(Config.Mcd1, name, MAXPATHLEN);
data/pcsxr-1.9.94/gui/MemcardDlg.c:394:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		else strncpy(Config.Mcd2, name, MAXPATHLEN);
data/pcsxr-1.9.94/gui/MemcardDlg.c:676:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!strlen(Config.Mcd1)) {
data/pcsxr-1.9.94/gui/MemcardDlg.c:682:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!strlen(Config.Mcd2)) {
data/pcsxr-1.9.94/gui/Plugin.c:325:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ptr = src + strlen(src); \
data/pcsxr-1.9.94/gui/Plugin.c:365:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(dotdir, getenv("HOME"), MAXPATHLEN-100);
data/pcsxr-1.9.94/gui/Plugin.c:369:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(info.CdromID, CdromId, 9);
data/pcsxr-1.9.94/gui/Plugin.c:370:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(info.CdromLabel, CdromLabel, 9);
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:165:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t lenstr = strlen(str);
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:436:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(tocname, isofile, sizeof(tocname));
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:438:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(tocname) >= 4) {
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:439:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strcpy(tocname + strlen(tocname) - 4, ".toc");
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:447:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strcpy(tocname + strlen(tocname) - 4, ".cue");
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:451:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			t = strlen(tocname);
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:473:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(tmp, linebuf, sizeof(linebuf));
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:505:5:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
				sscanf(linebuf, "DATAFILE \"%[^\"]\" #%d %8s", name, &t, time2);
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:512:5:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
				sscanf(linebuf, "DATAFILE \"%[^\"]\" %8s", name, time);
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:517:4:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
			sscanf(linebuf, "FILE \"%[^\"]\" #%d %8s %8s", name, &t, time, time2);
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:577:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(cuename, isofile, sizeof(cuename));
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:579:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(cuename) >= 4) {
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:580:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strcpy(cuename + strlen(cuename) - 4, ".cue");
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:604:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(filepath, cuename, sizeof(filepath));
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:623:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(dummy, linebuf, sizeof(linebuf));
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:670:8:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
			if (sscanf(linebuf, " INDEX %02d %8s", &t, time) != 2)
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:693:8:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
			if (sscanf(linebuf, " PREGAP %8s", time) == 1) {
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:702:5:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
				sscanf(linebuf, " FILE %256s", tmpb);
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:715:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
				strncpy(incue_fname, tmp, incue_max_len);
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:735:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (numtracks == 0 && strlen(isofile) >= 4 &&
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:736:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				strcmp(isofile + strlen(isofile) - 4, ".cue") == 0)
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:761:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(ccdname, isofile, sizeof(ccdname));
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:763:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(ccdname) >= 4) {
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:764:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strcpy(ccdname + strlen(ccdname) - 4, ".ccd");
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:820:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(mdsname, isofile, sizeof(mdsname));
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:822:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(mdsname) >= 4) {
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:823:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strcpy(mdsname + strlen(mdsname) - 4, ".mds");
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:864:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (fgetc(fi) < 0xA0) {
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:872:31:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	subChanMixed = subChanRaw = (fgetc(fi) ? TRUE : FALSE);
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:879:18:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ti[i].type = ((fgetc(fi) == 0xA9) ? CDDA : DATA);
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:883:20:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ti[i].start[0] = fgetc(fi);
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:884:20:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ti[i].start[1] = fgetc(fi);
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:885:20:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ti[i].start[2] = fgetc(fi);
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:940:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(isofile) >= 4)
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:941:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ext = isofile + strlen(isofile) - 4;
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1103:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(isofile) >= 5)
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1104:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ext = isofile + strlen(isofile) - 5;
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1171:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(subname, isoname, sizeof(subname));
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1173:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(subname) >= 4) {
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1174:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strcpy(subname + strlen(subname) - 4, ".sub");
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1191:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(sbiname, isoname, sizeof(sbiname));
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1193:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(sbiname) >= 4) {
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1194:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strcpy(sbiname + strlen(sbiname) - 4, ".sbi");
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1383:11:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		int c = fgetc(f);
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1390:8:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			c = fgetc(f);
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1496:4:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		(fgetc(cdHandle) == 'E') &&
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1497:4:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		(fgetc(cdHandle) == 'C') &&
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1498:4:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		(fgetc(cdHandle) == 'M') &&
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1499:4:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		(fgetc(cdHandle) == 0x00) &&
data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1500:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(strncmp((isoname+strlen(isoname)-5), ".ecm", 4))
data/pcsxr-1.9.94/libpcsxcore/cdrom.c:960:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
			strncpy((char *)&cdr.Result[4], "PCSX", 4);
data/pcsxr-1.9.94/libpcsxcore/cheat.c:86:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (buf[0] == '[' && buf[strlen(buf) - 1] == ']') {
data/pcsxr-1.9.94/libpcsxcore/cheat.c:102:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			buf[strlen(buf) - 1] = '\0';
data/pcsxr-1.9.94/libpcsxcore/debug.c:400:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			WriteSocket(reply, strlen(reply));
data/pcsxr-1.9.94/libpcsxcore/debug.c:433:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(cmd) <= 2) {
data/pcsxr-1.9.94/libpcsxcore/debug.c:435:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        } else if (strlen(cmd) == 3) {
data/pcsxr-1.9.94/libpcsxcore/debug.c:1085:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        WriteSocket(reply, strlen(reply));
data/pcsxr-1.9.94/libpcsxcore/debug.c:1106:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            WriteSocket(reply, strlen(reply));
data/pcsxr-1.9.94/libpcsxcore/debug.c:1114:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            WriteSocket(reply, strlen(reply));
data/pcsxr-1.9.94/libpcsxcore/debug.c:1121:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            WriteSocket(reply, strlen(reply));
data/pcsxr-1.9.94/libpcsxcore/debug.c:1128:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            WriteSocket(reply, strlen(reply));
data/pcsxr-1.9.94/libpcsxcore/debug.c:1135:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            WriteSocket(reply, strlen(reply));
data/pcsxr-1.9.94/libpcsxcore/debug.c:1142:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            WriteSocket(reply, strlen(reply));
data/pcsxr-1.9.94/libpcsxcore/debug.c:1149:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            WriteSocket(reply, strlen(reply));
data/pcsxr-1.9.94/libpcsxcore/debug.c:1156:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            WriteSocket(reply, strlen(reply));
data/pcsxr-1.9.94/libpcsxcore/misc.c:111:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!strlen(filename)) return -1;
data/pcsxr-1.9.94/libpcsxcore/misc.c:133:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (!strnicmp((char *)&dir->name[0], filename, strlen(filename))) {
data/pcsxr-1.9.94/libpcsxcore/misc.c:176:3:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
		sscanf((char *)buf + 12, "BOOT = cdrom:\\%256s", exename);
data/pcsxr-1.9.94/libpcsxcore/misc.c:178:4:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
			sscanf((char *)buf + 12, "BOOT = cdrom:%256s", exename);
data/pcsxr-1.9.94/libpcsxcore/misc.c:184:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
					strncpy(exename, ptr, 255);
data/pcsxr-1.9.94/libpcsxcore/misc.c:232:2:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
	sscanf(filename, "cdrom:\\%256s", exename);
data/pcsxr-1.9.94/libpcsxcore/misc.c:289:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(CdromLabel, buf + 52, 32);
data/pcsxr-1.9.94/libpcsxcore/misc.c:301:3:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
		sscanf((char *)buf + 12, "BOOT = cdrom:\\%256s", exename);
data/pcsxr-1.9.94/libpcsxcore/misc.c:303:4:  [1] (buffer) sscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
			sscanf((char *)buf + 12, "BOOT = cdrom:%256s", exename);
data/pcsxr-1.9.94/libpcsxcore/misc.c:309:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
					strncpy(exename, ptr, 255);
data/pcsxr-1.9.94/libpcsxcore/misc.c:327:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(exename);
data/pcsxr-1.9.94/libpcsxcore/misc.c:348:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(CdromLabel, CdromId, 9);
data/pcsxr-1.9.94/libpcsxcore/misc.c:411:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
	strncpy(CdromId, "SLUS99999", 9);
data/pcsxr-1.9.94/libpcsxcore/misc.c:412:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
	strncpy(CdromLabel, "SLUS_999.99", 11);
data/pcsxr-1.9.94/libpcsxcore/plugins.c:833:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(IsoFile, filename, MAXPATHLEN);
data/pcsxr-1.9.94/libpcsxcore/ppc/pR3000A.c:3527:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ppcPtr += strlen((char *)ppcPtr);
data/pcsxr-1.9.94/libpcsxcore/ppf.c:225:11:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	method = fgetc(ppffile);
data/pcsxr-1.9.94/libpcsxcore/ppf.c:265:17:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			blockcheck = fgetc(ppffile);
data/pcsxr-1.9.94/libpcsxcore/ppf.c:266:11:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			undo = fgetc(ppffile);
data/pcsxr-1.9.94/libpcsxcore/ppf.c:307:9:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		anz = fgetc(ppffile);
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:942:7:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	v0 = getchar(); pc0 = ra;
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1861:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(dir->name, ptr, sizeof(dir->name)); \
data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1945:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		namelen = strlen(Ra1+5); \
data/pcsxr-1.9.94/libpcsxcore/sio.c:1260:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(Info->ID, ptr, 12);
data/pcsxr-1.9.94/libpcsxcore/sio.c:1262:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(Info->Name, ptr, 16);
data/pcsxr-1.9.94/libpcsxcore/socket.c:123:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    WriteSocket(hello, strlen(hello));
data/pcsxr-1.9.94/libpcsxcore/socket.c:175:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(buffer, tbuf, r);
data/pcsxr-1.9.94/macosx/Plugin.c:70:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ptr = src + strlen(src); \
data/pcsxr-1.9.94/macosx/Plugin.c:107:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(info.CdromID, CdromId, 9);
data/pcsxr-1.9.94/macosx/Plugin.c:108:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(info.CdromLabel, CdromLabel, 11);
data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:105:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			dev_path_length = strlen(psz_buf);
data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cfg.c:36:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(CdromDev, "");
data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:345:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(1000);
data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:429:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(1000);
data/pcsxr-1.9.94/plugins/bladesio1/gui.c:99:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (msg[strlen(msg) - 1] == '\n') msg[strlen(msg) - 1] = 0;
data/pcsxr-1.9.94/plugins/bladesio1/gui.c:99:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (msg[strlen(msg) - 1] == '\n') msg[strlen(msg) - 1] = 0;
data/pcsxr-1.9.94/plugins/bladesio1/gui.c:113:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	gtk_clipboard_set_text(gtk_clipboard_get(GDK_SELECTION_CLIPBOARD), str, strlen(str));
data/pcsxr-1.9.94/plugins/bladesio1/gui.c:159:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(settings.ip, gtk_entry_get_text(GTK_ENTRY(widget)), sizeof(settings.ip) - 1);
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:126:24:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
			while (locked == 0) usleep(5000);
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:214:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
			usleep(5000);
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:224:25:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		while (locked == 0) { usleep(5000); }
data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:249:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(5000);
data/pcsxr-1.9.94/plugins/dfcdrom/cdrcfg-0.1df/main.c:182:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(CdromDev, gtk_entry_get_text(GTK_ENTRY(gtk_bin_get_child(GTK_BIN(widget)))), 255);
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:153:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat(buf, " ");
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:192:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat(buf, " ");
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:446:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(5000);
data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:537:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(5000);
data/pcsxr-1.9.94/plugins/dfinput/pad.c:84:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(1000);
data/pcsxr-1.9.94/plugins/dfnet/gui.c:27:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (msg[strlen(msg) - 1] == '\n') msg[strlen(msg) - 1] = 0;
data/pcsxr-1.9.94/plugins/dfnet/gui.c:27:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (msg[strlen(msg) - 1] == '\n') msg[strlen(msg) - 1] = 0;
data/pcsxr-1.9.94/plugins/dfnet/gui.c:93:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	gtk_clipboard_set_text(gtk_clipboard_get(GDK_SELECTION_CLIPBOARD), str, strlen(str));
data/pcsxr-1.9.94/plugins/dfnet/gui.c:199:23:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		strcat(msg, *args); strcat(msg, " ");
data/pcsxr-1.9.94/plugins/dfnet/unix.c:26:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(cfg, " ");
data/pcsxr-1.9.94/plugins/dfnet/unix.c:108:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(100000);
data/pcsxr-1.9.94/plugins/dfnet/unix.c:112:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(100000);
data/pcsxr-1.9.94/plugins/dfsound/openal.c:289:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
        usleep(1);
data/pcsxr-1.9.94/plugins/dfsound/spu.c:599:6:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
     usleep(PAUSE_L);                                  // else sleep for x ms (linux)
data/pcsxr-1.9.94/plugins/dfsound/spu.c:927:18:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
                 usleep(1000L);
data/pcsxr-1.9.94/plugins/dfsound/spu.c:1258:36:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
   while(!bThreadEnded && i<2000) {usleep(1000L);i++;} // -> wait until thread has ended
data/pcsxr-1.9.94/plugins/dfsound/xa.c:466:21:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    if (!iUseTimer) usleep(1000);
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:40:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  p+=strlen(name); \
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:48:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  p+=strlen(name); \
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:56:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  p+=strlen(name); \
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:60:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(p, t1, len); \
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:71:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  p+=strlen(name); \
data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:75:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(p, t1, len); \
data/pcsxr-1.9.94/plugins/dfxvideo/draw.c:1664:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		XDrawImageString(display,window,hGC,2,13,szDispBuf,strlen(szDispBuf));
data/pcsxr-1.9.94/plugins/dfxvideo/fps.c:111:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(tickstogo*10 - 200);
data/pcsxr-1.9.94/plugins/dfxvideo/fps.c:222:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(tickstogo*10 - 200);
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:213:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 if(strlen(pText)>511) return;
data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:330:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fwrite(pB, strlen(pB), 1, txtfile);
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:365:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
   strcat(pB,"\n");
data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:446:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fwrite(pB,strlen(pB),1,in);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:310:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sprintf(szTxt+strlen(szTxt)," - %d textures usable\r\n\r\n",iSortTexCnt);
data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:412:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   fwrite(pB,strlen(pB),1,txtfile);
data/pcsxr-1.9.94/plugins/peopsxgl/menu.c:1480:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 DrawText(hdcMem,szB,strlen(szB),&r,                   // paint the text (including clipping and word break)
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:116:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	SetKey("Bios", Conf->Bios, strlen(Conf->Bios), REG_SZ);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:117:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	SetKey("Gpu",  Conf->Gpu,  strlen(Conf->Gpu),  REG_SZ);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:118:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	SetKey("Spu",  Conf->Spu,  strlen(Conf->Spu),  REG_SZ);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:119:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	SetKey("Cdr",  Conf->Cdr,  strlen(Conf->Cdr),  REG_SZ);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:120:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	SetKey("Pad1", Conf->Pad1, strlen(Conf->Pad1), REG_SZ);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:121:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	SetKey("Pad2", Conf->Pad2, strlen(Conf->Pad2), REG_SZ);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:122:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	SetKey("Sio1", Conf->Sio1, strlen(Conf->Sio1), REG_SZ);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:123:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	SetKey("Net",  Conf->Net,  strlen(Conf->Net),  REG_SZ);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:124:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	SetKey("Mcd1", Conf->Mcd1, strlen(Conf->Mcd1), REG_SZ);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:125:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	SetKey("Mcd2", Conf->Mcd2, strlen(Conf->Mcd2), REG_SZ);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:126:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	SetKey("Lang", Conf->Lang, strlen(Conf->Lang), REG_SZ);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:127:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	SetKey("PluginsDir", Conf->PluginsDir, strlen(Conf->PluginsDir), REG_SZ);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:128:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	SetKey("BiosDir",    Conf->BiosDir,    strlen(Conf->BiosDir), REG_SZ);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:156:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	lp = (char *)malloc(strlen(FindData.cFileName)+8); \
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:238:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	lp = (char *)malloc(strlen("HLE") + 1);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:246:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(tmpStr, "*");
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:254:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			lp = (char *)malloc(strlen(FindData.cFileName)+8);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:506:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int len = strlen(Path);
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:508:33:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
			if (Path[len - 1] != '\\') { strcat(Path,"\\"); }
data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:636:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	lp = (char *)malloc(strlen("Disabled")+8);
data/pcsxr-1.9.94/win32/gui/WndMain.c:130:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int len = strlen(dst) + 1;
data/pcsxr-1.9.94/win32/gui/WndMain.c:191:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buf, lpCmdLine, 4096);
data/pcsxr-1.9.94/win32/gui/WndMain.c:202:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
					strncpy(buf, lpCmdLine + (arg - buf), 4096);
data/pcsxr-1.9.94/win32/gui/WndMain.c:1135:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (!strlen(Config.Mcd1)) strcpy(Config.Mcd1, "memcards\\Mcd001.mcr");
data/pcsxr-1.9.94/win32/gui/WndMain.c:1136:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (!strlen(Config.Mcd2)) strcpy(Config.Mcd2, "memcards\\Mcd002.mcr");
data/pcsxr-1.9.94/win32/gui/WndMain.c:1477:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str = szFilter + strlen(szFilter) + 1; 
data/pcsxr-1.9.94/win32/gui/WndMain.c:1480:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str+= strlen(str) + 1;
data/pcsxr-1.9.94/win32/gui/WndMain.c:1482:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str+= strlen(str) + 1;
data/pcsxr-1.9.94/win32/gui/WndMain.c:1485:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str+= strlen(str) + 1;
data/pcsxr-1.9.94/win32/gui/WndMain.c:1487:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str+= strlen(str) + 1;
data/pcsxr-1.9.94/win32/gui/WndMain.c:1490:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str+= strlen(str) + 1;
data/pcsxr-1.9.94/win32/gui/WndMain.c:1492:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str+= strlen(str) + 1;
data/pcsxr-1.9.94/win32/gui/WndMain.c:1495:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str+= strlen(str) + 1;
data/pcsxr-1.9.94/win32/gui/WndMain.c:1497:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str+= strlen(str) + 1;
data/pcsxr-1.9.94/win32/gui/WndMain.c:1500:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str+= strlen(str) + 1;
data/pcsxr-1.9.94/win32/gui/WndMain.c:1502:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str+= strlen(str) + 1;
data/pcsxr-1.9.94/win32/gui/WndMain.c:1505:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str+= strlen(str) + 1;
data/pcsxr-1.9.94/win32/gui/WndMain.c:1507:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str+= strlen(str) + 1;
data/pcsxr-1.9.94/win32/gui/WndMain.c:1583:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str = szFilter + strlen(szFilter) + 1; 
data/pcsxr-1.9.94/win32/gui/WndMain.c:1586:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str += strlen(str) + 1;
data/pcsxr-1.9.94/win32/gui/WndMain.c:1588:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str += strlen(str) + 1;
data/pcsxr-1.9.94/win32/gui/WndMain.c:1878:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	WriteConsole(hConsole, msg, (DWORD)strlen(msg), &tmp, 0);
data/pcsxr-1.9.94/win32/gui/plugin.c:73:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(trimlabel, CdromLabel, 32);
data/pcsxr-1.9.94/win32/gui/plugin.c:207:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ptr = src + strlen(src); \
data/pcsxr-1.9.94/win32/gui/plugin.c:227:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(info.CdromID, CdromId, 9);
data/pcsxr-1.9.94/win32/gui/plugin.c:228:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(info.CdromLabel, CdromLabel, 9);
data/pcsxr-1.9.94/win32/intl/bindtextdom.c:84:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len=strlen(dirname);
data/pcsxr-1.9.94/win32/intl/bindtextdom.c:91:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len1 = strlen (dirname) + 1;
data/pcsxr-1.9.94/win32/intl/bindtextdom.c:148:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	      size_t len = strlen (dirname) + 1;
data/pcsxr-1.9.94/win32/intl/bindtextdom.c:186:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen (domainname) + 1;
data/pcsxr-1.9.94/win32/intl/bindtextdom.c:206:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  len = strlen (dirname) + 1;
data/pcsxr-1.9.94/win32/intl/dcgettext.c:270:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t dirname_len = strlen (binding->dirname) + 1;
data/pcsxr-1.9.94/win32/intl/dcgettext.c:305:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  xdomainname = (char *) alloca (strlen (categoryname)
data/pcsxr-1.9.94/win32/intl/dcgettext.c:306:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				 + strlen (domainname) + 5);
data/pcsxr-1.9.94/win32/intl/dcgettext.c:314:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  single_locale = (char *) alloca (strlen (categoryvalue) + 1);
data/pcsxr-1.9.94/win32/intl/dcgettext.c:412:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nls_uint32 len = strlen (msgid);
data/pcsxr-1.9.94/win32/intl/finddomain.c:113:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			       strlen (dirname) + 1, 0, locale, NULL, NULL,
data/pcsxr-1.9.94/win32/intl/finddomain.c:149:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen (alias_value) + 1;
data/pcsxr-1.9.94/win32/intl/finddomain.c:168:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			       strlen (dirname) + 1, mask, language, territory,
data/pcsxr-1.9.94/win32/intl/l10nflist.c:88:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t part_len = strlen (argz);
data/pcsxr-1.9.94/win32/intl/l10nflist.c:112:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t part_len = strlen (argz);
data/pcsxr-1.9.94/win32/intl/l10nflist.c:196:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				  + strlen (language)
data/pcsxr-1.9.94/win32/intl/l10nflist.c:198:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				     ? strlen (territory) + 1 : 0)
data/pcsxr-1.9.94/win32/intl/l10nflist.c:200:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				     ? strlen (codeset) + 1 : 0)
data/pcsxr-1.9.94/win32/intl/l10nflist.c:202:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				     ? strlen (normalized_codeset) + 1 : 0)
data/pcsxr-1.9.94/win32/intl/l10nflist.c:205:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				     ? strlen (modifier) + 1 : 0)
data/pcsxr-1.9.94/win32/intl/l10nflist.c:207:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				     ? strlen (special) + 1 : 0)
data/pcsxr-1.9.94/win32/intl/l10nflist.c:211:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					     ? strlen (sponsor) + 1 : 0)
data/pcsxr-1.9.94/win32/intl/l10nflist.c:213:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					   ? strlen (revision) + 1 : 0)) : 0)
data/pcsxr-1.9.94/win32/intl/l10nflist.c:214:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				  + 1 + strlen (filename) + 1);
data/pcsxr-1.9.94/win32/intl/l10nflist.c:337:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    = _nl_make_l10nflist (l10nfile_list, dir, strlen (dir) + 1, cnt,
data/pcsxr-1.9.94/win32/intl/loadmsgcat.c:54:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
# define read   __read
data/pcsxr-1.9.94/win32/intl/loadmsgcat.c:137:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  long int nb = (long int) read (fd, read_ptr, to_read);
data/pcsxr-1.9.94/win32/intl/localealias.c:319:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	      alias_len = strlen (alias) + 1;
data/pcsxr-1.9.94/win32/intl/localealias.c:320:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	      value_len = strlen (value) + 1;
data/pcsxr-1.9.94/win32/intl/textdomain.c:89:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen (domainname) + 1;
data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:528:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			buff[strlen (buff) -4] = '\0';
data/pcsxr-1.9.94/win32/plugins/bladesio1/winsrc/cfg-winapi.c:60:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	RegSetValueEx(myKey, "ip", 0, REG_SZ, (BYTE*)settings.ip, strlen(settings.ip));
data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/draw.c:4302:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 DrawText(hdcMem,szB,strlen(szB),&r,                   // paint the text (including clipping and word break)
data/pcsxr-1.9.94/win32/zlib/gzio.c:108:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s->path = (char*)ALLOC(strlen(path)+1);
data/pcsxr-1.9.94/win32/zlib/gzio.c:542:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(buf); /* some *sprintf don't return the nb of bytes written */
data/pcsxr-1.9.94/win32/zlib/gzio.c:566:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(buf); /* old sprintf doesn't return the nb of bytes written */
data/pcsxr-1.9.94/win32/zlib/gzio.c:596:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return gzwrite(file, (char*)s, (unsigned)strlen(s));
data/pcsxr-1.9.94/win32/zlib/gzio.c:874:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s->msg = (char*)ALLOC(strlen(s->path) + strlen(m) + 3);
data/pcsxr-1.9.94/win32/zlib/gzio.c:874:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s->msg = (char*)ALLOC(strlen(s->path) + strlen(m) + 3);
data/pcsxr-1.9.94/win32/zlib/infblock.c:212:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              z->total_out + (q >= s->read ? q - s->read :
data/pcsxr-1.9.94/win32/zlib/infblock.c:212:53:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              z->total_out + (q >= s->read ? q - s->read :
data/pcsxr-1.9.94/win32/zlib/infblock.c:213:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              (s->end - s->read) + (q - s->window))));
data/pcsxr-1.9.94/win32/zlib/infblock.c:346:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              z->total_out + (q >= s->read ? q - s->read :
data/pcsxr-1.9.94/win32/zlib/infblock.c:346:53:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              z->total_out + (q >= s->read ? q - s->read :
data/pcsxr-1.9.94/win32/zlib/infblock.c:347:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
              (s->end - s->read) + (q - s->window))));
data/pcsxr-1.9.94/win32/zlib/infblock.c:356:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (s->read != s->write)
data/pcsxr-1.9.94/win32/zlib/infcodes.c:226:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (s->read != s->write)
data/pcsxr-1.9.94/win32/zlib/infutil.c:34:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  q = s->read;
data/pcsxr-1.9.94/win32/zlib/infutil.h:56:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  Bytef *read;          /* window read pointer */
data/pcsxr-1.9.94/win32/zlib/infutil.h:78:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define WAVAIL (uInt)(q<s->read?s->read-q-1:s->end-q)
data/pcsxr-1.9.94/win32/zlib/infutil.h:80:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define WRAP {if(q==s->end&&s->read!=s->window){q=s->window;m=(uInt)WAVAIL;}}

ANALYSIS SUMMARY:

Hits = 1951
Lines analyzed = 161277 in approximately 4.35 seconds (37080 lines/second)
Physical Source Lines of Code (SLOC) = 120654
Hits@level = [0] 471 [1] 280 [2] 1217 [3]  59 [4] 393 [5]   2
Hits@level+ = [0+] 2422 [1+] 1951 [2+] 1671 [3+] 454 [4+] 395 [5+]   2
Hits/KSLOC@level+ = [0+] 20.0739 [1+] 16.1702 [2+] 13.8495 [3+] 3.76283 [4+] 3.27382 [5+] 0.0165763
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.