Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/pcsxr-1.9.94/libpcsxcore/misc.h Examining data/pcsxr-1.9.94/libpcsxcore/psxcounters.h Examining data/pcsxr-1.9.94/libpcsxcore/coff.h Examining data/pcsxr-1.9.94/libpcsxcore/cheat.c Examining data/pcsxr-1.9.94/libpcsxcore/sio.h Examining data/pcsxr-1.9.94/libpcsxcore/cdrom.c Examining data/pcsxr-1.9.94/libpcsxcore/sjisfont.h Examining data/pcsxr-1.9.94/libpcsxcore/psxmem.h Examining data/pcsxr-1.9.94/libpcsxcore/psxcommon.c Examining data/pcsxr-1.9.94/libpcsxcore/psxdma.h Examining data/pcsxr-1.9.94/libpcsxcore/decode_xa.h Examining data/pcsxr-1.9.94/libpcsxcore/psxhw.c Examining data/pcsxr-1.9.94/libpcsxcore/ppf.c Examining data/pcsxr-1.9.94/libpcsxcore/r3000a.h Examining data/pcsxr-1.9.94/libpcsxcore/system.h Examining data/pcsxr-1.9.94/libpcsxcore/psxhle.c Examining data/pcsxr-1.9.94/libpcsxcore/misc.c Examining data/pcsxr-1.9.94/libpcsxcore/cdrom.h Examining data/pcsxr-1.9.94/libpcsxcore/mdec.h Examining data/pcsxr-1.9.94/libpcsxcore/ix86/ix86.c Examining data/pcsxr-1.9.94/libpcsxcore/ix86/ix86.h Examining data/pcsxr-1.9.94/libpcsxcore/ix86/iR3000A.c Examining data/pcsxr-1.9.94/libpcsxcore/ix86/iGte.h Examining data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c Examining data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86-64.h Examining data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_3dnow.c Examining data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_fpu.c Examining data/pcsxr-1.9.94/libpcsxcore/ix86_64/iR3000A-64.c Examining data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_mmx.c Examining data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_sse.c Examining data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86-64.c Examining data/pcsxr-1.9.94/libpcsxcore/ix86_64/iGte.h Examining data/pcsxr-1.9.94/libpcsxcore/mdec.c Examining data/pcsxr-1.9.94/libpcsxcore/psxhw.h Examining data/pcsxr-1.9.94/libpcsxcore/ppf.h Examining data/pcsxr-1.9.94/libpcsxcore/gte.c Examining data/pcsxr-1.9.94/libpcsxcore/psxinterpreter.c Examining data/pcsxr-1.9.94/libpcsxcore/disr3000a.c Examining data/pcsxr-1.9.94/libpcsxcore/psemu_plugin_defs.h Examining data/pcsxr-1.9.94/libpcsxcore/plugins.c Examining data/pcsxr-1.9.94/libpcsxcore/spu.h Examining data/pcsxr-1.9.94/libpcsxcore/debug.h Examining data/pcsxr-1.9.94/libpcsxcore/gpu.c Examining data/pcsxr-1.9.94/libpcsxcore/gte.h Examining data/pcsxr-1.9.94/libpcsxcore/ppc/ppc_mnemonics.h Examining data/pcsxr-1.9.94/libpcsxcore/ppc/reguse.h Examining data/pcsxr-1.9.94/libpcsxcore/ppc/ppc.h Examining data/pcsxr-1.9.94/libpcsxcore/ppc/ppc.c Examining data/pcsxr-1.9.94/libpcsxcore/ppc/reguse.c Examining data/pcsxr-1.9.94/libpcsxcore/ppc/pGte.h Examining data/pcsxr-1.9.94/libpcsxcore/ppc/pR3000A.c Examining data/pcsxr-1.9.94/libpcsxcore/decode_xa.c Examining data/pcsxr-1.9.94/libpcsxcore/spu.c Examining data/pcsxr-1.9.94/libpcsxcore/psxhle.h Examining data/pcsxr-1.9.94/libpcsxcore/sio.c Examining data/pcsxr-1.9.94/libpcsxcore/ecm.h Examining data/pcsxr-1.9.94/libpcsxcore/plugins.h Examining data/pcsxr-1.9.94/libpcsxcore/psxcommon.h Examining data/pcsxr-1.9.94/libpcsxcore/psxbios.c Examining data/pcsxr-1.9.94/libpcsxcore/socket.c Examining data/pcsxr-1.9.94/libpcsxcore/gpu.h Examining data/pcsxr-1.9.94/libpcsxcore/cdriso.h Examining data/pcsxr-1.9.94/libpcsxcore/psxbios.h Examining data/pcsxr-1.9.94/libpcsxcore/psxdma.c Examining data/pcsxr-1.9.94/libpcsxcore/psxmem.c Examining data/pcsxr-1.9.94/libpcsxcore/cheat.h Examining data/pcsxr-1.9.94/libpcsxcore/psxcounters.c Examining data/pcsxr-1.9.94/libpcsxcore/socket.h Examining data/pcsxr-1.9.94/libpcsxcore/debug.c Examining data/pcsxr-1.9.94/libpcsxcore/r3000a.c Examining data/pcsxr-1.9.94/libpcsxcore/cdriso.c Examining data/pcsxr-1.9.94/gui/Linux.h Examining data/pcsxr-1.9.94/gui/Plugin.c Examining data/pcsxr-1.9.94/gui/Cheat.c Examining data/pcsxr-1.9.94/gui/MemcardDlg.h Examining data/pcsxr-1.9.94/gui/ConfDlg.h Examining data/pcsxr-1.9.94/gui/DebugMemory.c Examining data/pcsxr-1.9.94/gui/AboutDlg.c Examining data/pcsxr-1.9.94/gui/DebugMemory.h Examining data/pcsxr-1.9.94/gui/AboutDlg.h Examining data/pcsxr-1.9.94/gui/MemcardDlg.c Examining data/pcsxr-1.9.94/gui/Cheat.h Examining data/pcsxr-1.9.94/gui/nopic.h Examining data/pcsxr-1.9.94/gui/Config.c Examining data/pcsxr-1.9.94/gui/ConfDlg.c Examining data/pcsxr-1.9.94/gui/LnxMain.c Examining data/pcsxr-1.9.94/gui/GtkGui.c Examining data/pcsxr-1.9.94/win32/config.h Examining data/pcsxr-1.9.94/win32/resource.h Examining data/pcsxr-1.9.94/win32/gui/NoPic.h Examining data/pcsxr-1.9.94/win32/gui/CheatDlg.c Examining data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c Examining data/pcsxr-1.9.94/win32/gui/AboutDlg.c Examining data/pcsxr-1.9.94/win32/gui/plugin.h Examining data/pcsxr-1.9.94/win32/gui/WndMain.c Examining data/pcsxr-1.9.94/win32/gui/AboutDlg.h Examining data/pcsxr-1.9.94/win32/gui/Win32.h Examining data/pcsxr-1.9.94/win32/gui/plugin.c Examining data/pcsxr-1.9.94/win32/glue/stdint.h Examining data/pcsxr-1.9.94/win32/glue/sys/mman.h Examining data/pcsxr-1.9.94/win32/zlib/uncompr.c Examining data/pcsxr-1.9.94/win32/zlib/deflate.h Examining data/pcsxr-1.9.94/win32/zlib/inffixed.h Examining data/pcsxr-1.9.94/win32/zlib/inflate.c Examining data/pcsxr-1.9.94/win32/zlib/zutil.c Examining data/pcsxr-1.9.94/win32/zlib/inffast.h Examining data/pcsxr-1.9.94/win32/zlib/inftrees.h Examining data/pcsxr-1.9.94/win32/zlib/trees.h Examining data/pcsxr-1.9.94/win32/zlib/infblock.h Examining data/pcsxr-1.9.94/win32/zlib/infcodes.h Examining data/pcsxr-1.9.94/win32/zlib/infutil.c Examining data/pcsxr-1.9.94/win32/zlib/infutil.h Examining data/pcsxr-1.9.94/win32/zlib/infcodes.c Examining data/pcsxr-1.9.94/win32/zlib/zconf.h Examining data/pcsxr-1.9.94/win32/zlib/compress.c Examining data/pcsxr-1.9.94/win32/zlib/infblock.c Examining data/pcsxr-1.9.94/win32/zlib/trees.c Examining data/pcsxr-1.9.94/win32/zlib/zlib.h Examining data/pcsxr-1.9.94/win32/zlib/gzio.c Examining data/pcsxr-1.9.94/win32/zlib/zutil.h Examining data/pcsxr-1.9.94/win32/zlib/adler32.c Examining data/pcsxr-1.9.94/win32/zlib/inftrees.c Examining data/pcsxr-1.9.94/win32/zlib/deflate.c Examining data/pcsxr-1.9.94/win32/zlib/crc32.c Examining data/pcsxr-1.9.94/win32/zlib/inffast.c Examining data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/dsound.c Examining data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/record.c Examining data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/dsound.h Examining data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/psemu.c Examining data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/cfg.c Examining data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/debug.h Examining data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/record.h Examining data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/debug.c Examining data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/winmain.c Examining data/pcsxr-1.9.94/win32/plugins/dfsound/resource.h Examining data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.h Examining data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp Examining data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSXres.h Examining data/pcsxr-1.9.94/win32/plugins/bladesio1/winsrc/stdafx.h Examining data/pcsxr-1.9.94/win32/plugins/bladesio1/winsrc/cfg-winapi.h Examining data/pcsxr-1.9.94/win32/plugins/bladesio1/winsrc/cfg-winapi.c Examining data/pcsxr-1.9.94/win32/plugins/bladesio1/winsrc/winmain.c Examining data/pcsxr-1.9.94/win32/plugins/bladesio1/resource.h Examining data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/ssave.h Examining data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/fps.c Examining data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c Examining data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/ssave.c Examining data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/key.c Examining data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/winmain.c Examining data/pcsxr-1.9.94/win32/plugins/peopsxgl/resource.h Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/fps.c Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.c Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/draw.c Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/d3dcaps.h Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/d3dtypes.h Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/dxguid.c Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.h Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/ddraw.h Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/key.c Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/d3d.h Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/winmain.c Examining data/pcsxr-1.9.94/win32/plugins/dfxvideo/resource.h Examining data/pcsxr-1.9.94/win32/intl/dgettext.c Examining data/pcsxr-1.9.94/win32/intl/hash-string.h Examining data/pcsxr-1.9.94/win32/intl/intlconfig.h Examining data/pcsxr-1.9.94/win32/intl/finddomain.c Examining data/pcsxr-1.9.94/win32/intl/dcgettext.c Examining data/pcsxr-1.9.94/win32/intl/libintl.h Examining data/pcsxr-1.9.94/win32/intl/gettext.c Examining data/pcsxr-1.9.94/win32/intl/loadmsgcat.c Examining data/pcsxr-1.9.94/win32/intl/gettext.h Examining data/pcsxr-1.9.94/win32/intl/bindtextdom.c Examining data/pcsxr-1.9.94/win32/intl/localealias.c Examining data/pcsxr-1.9.94/win32/intl/explodename.c Examining data/pcsxr-1.9.94/win32/intl/intl-compat.c Examining data/pcsxr-1.9.94/win32/intl/textdomain.c Examining data/pcsxr-1.9.94/win32/intl/libgettext.h Examining data/pcsxr-1.9.94/win32/intl/l10nflist.c Examining data/pcsxr-1.9.94/win32/intl/gettextP.h Examining data/pcsxr-1.9.94/win32/intl/loadinfo.h Examining data/pcsxr-1.9.94/plugins/dfsound/dma.c Examining data/pcsxr-1.9.94/plugins/dfsound/registers.c Examining data/pcsxr-1.9.94/plugins/dfsound/gauss_i.h Examining data/pcsxr-1.9.94/plugins/dfsound/nullsnd.c Examining data/pcsxr-1.9.94/plugins/dfsound/adsr.h Examining data/pcsxr-1.9.94/plugins/dfsound/dma.h Examining data/pcsxr-1.9.94/plugins/dfsound/reverb.c Examining data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c Examining data/pcsxr-1.9.94/plugins/dfsound/externals.h Examining data/pcsxr-1.9.94/plugins/dfsound/regs.h Examining data/pcsxr-1.9.94/plugins/dfsound/cfg.c Examining data/pcsxr-1.9.94/plugins/dfsound/stdafx.h Examining data/pcsxr-1.9.94/plugins/dfsound/spu.h Examining data/pcsxr-1.9.94/plugins/dfsound/psemuxa.h Examining data/pcsxr-1.9.94/plugins/dfsound/sdl.c Examining data/pcsxr-1.9.94/plugins/dfsound/spu.c Examining data/pcsxr-1.9.94/plugins/dfsound/externals.c Examining data/pcsxr-1.9.94/plugins/dfsound/openal.c Examining data/pcsxr-1.9.94/plugins/dfsound/oss.c Examining data/pcsxr-1.9.94/plugins/dfsound/reverb.h Examining data/pcsxr-1.9.94/plugins/dfsound/adsr.c Examining data/pcsxr-1.9.94/plugins/dfsound/alsa.c Examining data/pcsxr-1.9.94/plugins/dfsound/registers.h Examining data/pcsxr-1.9.94/plugins/dfsound/xa.h Examining data/pcsxr-1.9.94/plugins/dfsound/xa.c Examining data/pcsxr-1.9.94/plugins/dfsound/cfg.h Examining data/pcsxr-1.9.94/plugins/dfsound/pulseaudio.c Examining data/pcsxr-1.9.94/plugins/dfsound/dsoundoss.h Examining data/pcsxr-1.9.94/plugins/dfsound/freeze.c Examining data/pcsxr-1.9.94/plugins/dfinput/pad.c Examining data/pcsxr-1.9.94/plugins/dfinput/util.h Examining data/pcsxr-1.9.94/plugins/dfinput/util.c Examining data/pcsxr-1.9.94/plugins/dfinput/sdljoy.c Examining data/pcsxr-1.9.94/plugins/dfinput/analog.c Examining data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c Examining data/pcsxr-1.9.94/plugins/dfinput/cfg.c Examining data/pcsxr-1.9.94/plugins/dfinput/pad.h Examining data/pcsxr-1.9.94/plugins/dfinput/xkb.c Examining data/pcsxr-1.9.94/plugins/bladesio1/connection.h Examining data/pcsxr-1.9.94/plugins/bladesio1/fifo.h Examining data/pcsxr-1.9.94/plugins/bladesio1/sio1.h Examining data/pcsxr-1.9.94/plugins/bladesio1/cfg.c Examining data/pcsxr-1.9.94/plugins/bladesio1/typedefs.h Examining data/pcsxr-1.9.94/plugins/bladesio1/fifo.c Examining data/pcsxr-1.9.94/plugins/bladesio1/sio1.c Examining data/pcsxr-1.9.94/plugins/bladesio1/connection.c Examining data/pcsxr-1.9.94/plugins/bladesio1/gui.c Examining data/pcsxr-1.9.94/plugins/peopsxgl/fps.c Examining data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c Examining data/pcsxr-1.9.94/plugins/peopsxgl/prim.c Examining data/pcsxr-1.9.94/plugins/peopsxgl/draw.c Examining data/pcsxr-1.9.94/plugins/peopsxgl/draw.h Examining data/pcsxr-1.9.94/plugins/peopsxgl/texture.h Examining data/pcsxr-1.9.94/plugins/peopsxgl/gte_accuracy.h Examining data/pcsxr-1.9.94/plugins/peopsxgl/menu.c Examining data/pcsxr-1.9.94/plugins/peopsxgl/externals.h Examining data/pcsxr-1.9.94/plugins/peopsxgl/soft.h Examining data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c Examining data/pcsxr-1.9.94/plugins/peopsxgl/gl_ext.h Examining data/pcsxr-1.9.94/plugins/peopsxgl/stdafx.h Examining data/pcsxr-1.9.94/plugins/peopsxgl/menu.h Examining data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c Examining data/pcsxr-1.9.94/plugins/peopsxgl/fps.h Examining data/pcsxr-1.9.94/plugins/peopsxgl/prim.h Examining data/pcsxr-1.9.94/plugins/peopsxgl/texture.c Examining data/pcsxr-1.9.94/plugins/peopsxgl/soft.c Examining data/pcsxr-1.9.94/plugins/peopsxgl/gpu.h Examining data/pcsxr-1.9.94/plugins/peopsxgl/key.c Examining data/pcsxr-1.9.94/plugins/peopsxgl/gte_accuracy.c Examining data/pcsxr-1.9.94/plugins/peopsxgl/cfg.h Examining data/pcsxr-1.9.94/plugins/peopsxgl/key.h Examining data/pcsxr-1.9.94/plugins/dfnet/unix.c Examining data/pcsxr-1.9.94/plugins/dfnet/gui.c Examining data/pcsxr-1.9.94/plugins/dfnet/cfg.c Examining data/pcsxr-1.9.94/plugins/dfnet/dfnet.c Examining data/pcsxr-1.9.94/plugins/dfnet/dfnet.h Examining data/pcsxr-1.9.94/plugins/dfcdrom/util.c Examining data/pcsxr-1.9.94/plugins/dfcdrom/cdr-null.c Examining data/pcsxr-1.9.94/plugins/dfcdrom/cdr-libcdio.c Examining data/pcsxr-1.9.94/plugins/dfcdrom/cdr-linux.c Examining data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c Examining data/pcsxr-1.9.94/plugins/dfcdrom/cdrcfg-0.1df/main.c Examining data/pcsxr-1.9.94/plugins/dfcdrom/cfg.c Examining data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h Examining data/pcsxr-1.9.94/plugins/dfxvideo/fps.c Examining data/pcsxr-1.9.94/plugins/dfxvideo/swap.h Examining data/pcsxr-1.9.94/plugins/dfxvideo/prim.c Examining data/pcsxr-1.9.94/plugins/dfxvideo/hq2x.h Examining data/pcsxr-1.9.94/plugins/dfxvideo/draw.c Examining data/pcsxr-1.9.94/plugins/dfxvideo/draw.h Examining data/pcsxr-1.9.94/plugins/dfxvideo/hq3x.h Examining data/pcsxr-1.9.94/plugins/dfxvideo/menu.c Examining data/pcsxr-1.9.94/plugins/dfxvideo/externals.h Examining data/pcsxr-1.9.94/plugins/dfxvideo/zn.c Examining data/pcsxr-1.9.94/plugins/dfxvideo/soft.h Examining data/pcsxr-1.9.94/plugins/dfxvideo/interp.h Examining data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c Examining data/pcsxr-1.9.94/plugins/dfxvideo/menu.h Examining data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c Examining data/pcsxr-1.9.94/plugins/dfxvideo/fps.h Examining data/pcsxr-1.9.94/plugins/dfxvideo/prim.h Examining data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c Examining data/pcsxr-1.9.94/plugins/dfxvideo/soft.c Examining data/pcsxr-1.9.94/plugins/dfxvideo/gpu.h Examining data/pcsxr-1.9.94/plugins/dfxvideo/key.c Examining data/pcsxr-1.9.94/plugins/dfxvideo/cfg.h Examining data/pcsxr-1.9.94/plugins/dfxvideo/key.h Examining data/pcsxr-1.9.94/macosx/PcsxrDiscHandler.h Examining data/pcsxr-1.9.94/macosx/ConfigurationController.h Examining data/pcsxr-1.9.94/macosx/HotkeyController.h Examining data/pcsxr-1.9.94/macosx/PcsxrPluginHandler.h Examining data/pcsxr-1.9.94/macosx/PcsxrMemCardArray.h Examining data/pcsxr-1.9.94/macosx/config.h Examining data/pcsxr-1.9.94/macosx/Plugin.c Examining data/pcsxr-1.9.94/macosx/CheatController.h Examining data/pcsxr-1.9.94/macosx/MemBadgeView.h Examining data/pcsxr-1.9.94/macosx/PcsxrHexadecimalFormatter.h Examining data/pcsxr-1.9.94/macosx/PcsxrMemCardController.h Examining data/pcsxr-1.9.94/macosx/PcsxrCheatHandler.h Examining data/pcsxr-1.9.94/macosx/PluginList.h Examining data/pcsxr-1.9.94/macosx/PcsxrMemCardHandler.h Examining data/pcsxr-1.9.94/macosx/PcsxrPlugin.h Examining data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/PluginConfigController.h Examining data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cfg.c Examining data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c Examining data/pcsxr-1.9.94/macosx/plugins/Bladesio1/macsrc/PluginConfigController.h Examining data/pcsxr-1.9.94/macosx/plugins/Bladesio1/macsrc/cfg.c Examining data/pcsxr-1.9.94/macosx/plugins/DFSound/macsrc/NamedSlider.h Examining data/pcsxr-1.9.94/macosx/plugins/DFSound/macsrc/maccfg.h Examining data/pcsxr-1.9.94/macosx/plugins/DFSound/macsrc/SPUPluginController.h Examining data/pcsxr-1.9.94/macosx/plugins/DFSound/macsrc/PluginController.h Examining data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/PadView.h Examining data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/PadController.h Examining data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/ControllerList.h Examining data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/MappingCell.h Examining data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c Examining data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/xkb.c Examining data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.h Examining data/pcsxr-1.9.94/macosx/plugins/DFXVideo/macsrc/PluginGLView.h Examining data/pcsxr-1.9.94/macosx/plugins/DFXVideo/macsrc/PluginConfigController.h Examining data/pcsxr-1.9.94/macosx/plugins/DFXVideo/macsrc/ExtendedKeys.h Examining data/pcsxr-1.9.94/macosx/plugins/DFXVideo/macsrc/PluginWindow.h Examining data/pcsxr-1.9.94/macosx/plugins/DFXVideo/macsrc/SGPUPreferences.h Examining data/pcsxr-1.9.94/macosx/plugins/DFXVideo/macsrc/PluginWindowController.h Examining data/pcsxr-1.9.94/macosx/plugins/PeopsXgl/macsrc/drawgl.h Examining data/pcsxr-1.9.94/macosx/plugins/PeopsXgl/macsrc/PluginGLView.h Examining data/pcsxr-1.9.94/macosx/plugins/PeopsXgl/macsrc/NetSfPeopsOpenGLPluginConfigController.h Examining data/pcsxr-1.9.94/macosx/plugins/PeopsXgl/macsrc/ExtendedKeys.h Examining data/pcsxr-1.9.94/macosx/plugins/PeopsXgl/macsrc/PluginWindow.h Examining data/pcsxr-1.9.94/macosx/plugins/PeopsXgl/macsrc/PluginWindowController.h Examining data/pcsxr-1.9.94/macosx/plugins/DFNet/macsrc/PluginConfigController.h Examining data/pcsxr-1.9.94/macosx/plugins/DFNet/macsrc/cfg.c Examining data/pcsxr-1.9.94/macosx/plugins/DFNet/macsrc/SockDialog.h Examining data/pcsxr-1.9.94/macosx/PcsxrFileHandle.h Examining data/pcsxr-1.9.94/macosx/OSXPlugLocalization.h Examining data/pcsxr-1.9.94/macosx/PcsxrController.h Examining data/pcsxr-1.9.94/macosx/hotkeys.h Examining data/pcsxr-1.9.94/macosx/ExtendedKeys.h Examining data/pcsxr-1.9.94/macosx/PcsxrFreezeStateHandler.h Examining data/pcsxr-1.9.94/macosx/PluginController.h Examining data/pcsxr-1.9.94/macosx/PcsxrMemoryObject.h Examining data/pcsxr-1.9.94/macosx/LaunchArg.h Examining data/pcsxr-1.9.94/macosx/EmuThread.h Examining data/pcsxr-1.9.94/macosx/RecentItemsMenu.h FINAL RESULTS: data/pcsxr-1.9.94/win32/gui/WndMain.c:983:10: [5] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). Risk is high, it appears that the size is given as bytes, but the function requires size as characters. if (MultiByteToWideChar(932, 0, (LPCSTR)Info->sTitle, -1, (LPWSTR)buf, sizeof(buf)) == 0) { data/pcsxr-1.9.94/win32/intl/gettext.c:72:6: [5] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). Risk is high, it appears that the size is given as bytes, but the function requires size as characters. if (MultiByteToWideChar(CP_UTF8, 0, (LPCSTR)t, -1, (LPWSTR)buf, sizeof(buf)) == 0) { data/pcsxr-1.9.94/gui/ConfDlg.c:85:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(conf, (char *)list[row * 2]); \ data/pcsxr-1.9.94/gui/ConfDlg.c:125:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.PluginsDir, path); data/pcsxr-1.9.94/gui/ConfDlg.c:245:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Gpu); data/pcsxr-1.9.94/gui/ConfDlg.c:266:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Spu); data/pcsxr-1.9.94/gui/ConfDlg.c:287:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Cdr); data/pcsxr-1.9.94/gui/ConfDlg.c:308:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Sio1); data/pcsxr-1.9.94/gui/ConfDlg.c:329:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Pad1); data/pcsxr-1.9.94/gui/ConfDlg.c:345:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Pad2); data/pcsxr-1.9.94/gui/ConfDlg.c:485:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.PluginsDir, path); data/pcsxr-1.9.94/gui/ConfDlg.c:501:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.BiosDir, foldername); data/pcsxr-1.9.94/gui/ConfDlg.c:528:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(type##ConfS.plist[type##ConfS.plugins - 1], name); \ data/pcsxr-1.9.94/gui/ConfDlg.c:529:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(type##ConfS.plist[type##ConfS.plugins - 2], ent->d_name); \ data/pcsxr-1.9.94/gui/ConfDlg.c:635:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(BiosConfS.plist[BiosConfS.plugins - 1], bios_name); data/pcsxr-1.9.94/gui/ConfDlg.c:636:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(BiosConfS.plist[BiosConfS.plugins - 2], internal_name); data/pcsxr-1.9.94/gui/ConfDlg.c:731:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name, "%s", PSE_getLibName()); data/pcsxr-1.9.94/gui/ConfDlg.c:738:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(name, ver); data/pcsxr-1.9.94/gui/ConfDlg.c:741:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(name, ent->d_name); data/pcsxr-1.9.94/gui/ConfDlg.c:807:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(plugin, "%s/%s", Config.PluginsDir, ent->d_name); data/pcsxr-1.9.94/gui/ConfDlg.c:823:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name, "%s", PSE_getLibName()); data/pcsxr-1.9.94/gui/ConfDlg.c:830:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(name, ver); data/pcsxr-1.9.94/gui/ConfDlg.c:833:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(name, ent->d_name); data/pcsxr-1.9.94/gui/Config.c:85:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cfgfile, PCSXR_DOT_DIR); data/pcsxr-1.9.94/gui/Config.c:89:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cfgfile, cfgfile_basename); data/pcsxr-1.9.94/gui/GtkGui.c:670:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(current_folder, Config.IsoImgDir); data/pcsxr-1.9.94/gui/GtkGui.c:672:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(current_folder, getenv("HOME")); data/pcsxr-1.9.94/gui/GtkGui.c:710:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(current_folder, path); data/pcsxr-1.9.94/gui/GtkGui.c:726:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.IsoImgDir, current_folder); data/pcsxr-1.9.94/gui/GtkGui.c:953:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Text, _("Loaded state %s."), state_filename); data/pcsxr-1.9.94/gui/GtkGui.c:956:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Text, _("Error loading state %s!"), state_filename); data/pcsxr-1.9.94/gui/GtkGui.c:978:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Text, _("Saved state %s."), state_filename); data/pcsxr-1.9.94/gui/GtkGui.c:980:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Text, _("Error saving state %s!"), state_filename); data/pcsxr-1.9.94/gui/GtkGui.c:1079:2: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(msg, fmt, list); data/pcsxr-1.9.94/gui/LnxMain.c:58:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(conf_mcd, mcd); data/pcsxr-1.9.94/gui/LnxMain.c:270:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(conf_plugin_name, plugin_name); data/pcsxr-1.9.94/gui/LnxMain.c:318:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(path, isofilename); data/pcsxr-1.9.94/gui/LnxMain.c:319:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(isofilename, path); data/pcsxr-1.9.94/gui/LnxMain.c:330:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(PACKAGE_STRING "\n"); data/pcsxr-1.9.94/gui/LnxMain.c:350:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(path, file); data/pcsxr-1.9.94/gui/LnxMain.c:351:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(file, path); data/pcsxr-1.9.94/gui/LnxMain.c:377:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.BiosDir, str_bios_dir); data/pcsxr-1.9.94/gui/LnxMain.c:381:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.PluginsDir, str_plugin_dir); data/pcsxr-1.9.94/gui/LnxMain.c:408:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.PatchesDir, str_patches_dir); data/pcsxr-1.9.94/gui/LnxMain.c:518:2: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(msg, fmt, list); data/pcsxr-1.9.94/gui/LnxMain.c:525:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(linestart ? " * %s" : "%s", msg); data/pcsxr-1.9.94/gui/MemcardDlg.c:678:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.Mcd1, str); data/pcsxr-1.9.94/gui/MemcardDlg.c:684:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.Mcd2, str); data/pcsxr-1.9.94/gui/Plugin.c:328:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dst, ptr+1); \ data/pcsxr-1.9.94/gui/Plugin.c:368:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(info.EmuName, "PCSXR " PACKAGE_VERSION); data/pcsxr-1.9.94/gui/Plugin.c:376:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(path, "%s%s", Config.BiosDir, Config.Bios); data/pcsxr-1.9.94/gui/Plugin.c:377:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(info.BIOSpath, path); data/pcsxr-1.9.94/gui/Plugin.c:378:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(info.MCD1path, Config.Mcd1); data/pcsxr-1.9.94/gui/Plugin.c:379:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(info.MCD2path, Config.Mcd2); data/pcsxr-1.9.94/gui/Plugin.c:380:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(path, "%s%s", dotdir, Config.Gpu); data/pcsxr-1.9.94/gui/Plugin.c:381:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(info.GPUpath, path); data/pcsxr-1.9.94/gui/Plugin.c:382:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(path, "%s%s", dotdir, Config.Spu); data/pcsxr-1.9.94/gui/Plugin.c:383:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(info.SPUpath, path); data/pcsxr-1.9.94/gui/Plugin.c:384:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(path, "%s%s", dotdir, Config.Cdr); data/pcsxr-1.9.94/gui/Plugin.c:385:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(info.CDRpath, path); data/pcsxr-1.9.94/gui/Plugin.c:400:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.Mcd1, info.MCD1path); data/pcsxr-1.9.94/gui/Plugin.c:401:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.Mcd2, info.MCD2path); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:450:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tocname, isofile); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:644:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ti[numtracks].filepath, filepath); data/pcsxr-1.9.94/libpcsxcore/debug.c:399:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "219 %s\r\n", disR3000AF(psxMemRead32(psxRegs.pc), psxRegs.pc)); data/pcsxr-1.9.94/libpcsxcore/debug.c:456:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "200 %s\r\n", arguments == NULL ? "OK" : arguments); data/pcsxr-1.9.94/libpcsxcore/debug.c:459:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "201 %s\r\n", PACKAGE_VERSION); data/pcsxr-1.9.94/libpcsxcore/debug.c:473:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "511 Malformed 111 command '%s'\r\n", cmd); data/pcsxr-1.9.94/libpcsxcore/debug.c:480:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "%s211 %02X(%2.2s)=%08X\r\n", reply, i, disRNameGPR[i], psxRegs.GPR.r[i]); data/pcsxr-1.9.94/libpcsxcore/debug.c:496:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "511 Malformed 113 command '%s'\r\n", cmd); data/pcsxr-1.9.94/libpcsxcore/debug.c:503:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "%s213 %02X(%8.8s)=%08X\r\n", reply, i, disRNameCP0[i], psxRegs.CP0.r[i]); data/pcsxr-1.9.94/libpcsxcore/debug.c:516:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "511 Malformed 114 command '%s'\r\n", cmd); data/pcsxr-1.9.94/libpcsxcore/debug.c:523:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "%s214 %02X(%6.6s)=%08X\r\n", reply, i, disRNameCP2C[i], psxRegs.CP2C.r[i]); data/pcsxr-1.9.94/libpcsxcore/debug.c:536:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "511 Malformed 111 command '%s'\r\n", cmd); data/pcsxr-1.9.94/libpcsxcore/debug.c:543:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "%s215 %02X(%4.4s)=%08X\r\n", reply, i, disRNameCP2D[i], psxRegs.CP2D.r[i]); data/pcsxr-1.9.94/libpcsxcore/debug.c:556:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "511 Malformed 119 command '%s'\r\n", cmd); data/pcsxr-1.9.94/libpcsxcore/debug.c:563:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "219 %s\r\n", disR3000AF(psxMemRead32(code), code)); data/pcsxr-1.9.94/libpcsxcore/debug.c:567:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 121 command '%s'\r\n", arguments); data/pcsxr-1.9.94/libpcsxcore/debug.c:585:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "512 Invalid LO/HI register: '%s'\r\n", arguments); data/pcsxr-1.9.94/libpcsxcore/debug.c:590:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 122 command '%s'\r\n", arguments); data/pcsxr-1.9.94/libpcsxcore/debug.c:598:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 123 command '%s'\r\n", arguments); data/pcsxr-1.9.94/libpcsxcore/debug.c:611:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 124 command '%s'\r\n", arguments); data/pcsxr-1.9.94/libpcsxcore/debug.c:624:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 121 command '%s'\r\n", arguments); data/pcsxr-1.9.94/libpcsxcore/debug.c:637:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 130 command '%s'\r\n", arguments); data/pcsxr-1.9.94/libpcsxcore/debug.c:646:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "513 Invalid address or range: '%s'\r\n", arguments); data/pcsxr-1.9.94/libpcsxcore/debug.c:651:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 140 command '%s'\r\n", arguments); data/pcsxr-1.9.94/libpcsxcore/debug.c:659:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "514 Invalid address or range: '%s'\r\n", arguments); data/pcsxr-1.9.94/libpcsxcore/debug.c:666:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 150 command '%s'\r\n", cmd); data/pcsxr-1.9.94/libpcsxcore/debug.c:679:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "250 Mapping of exec flow %s\r\n", code ? "started" : "stopped"); data/pcsxr-1.9.94/libpcsxcore/debug.c:685:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 151 command '%s'\r\n", cmd); data/pcsxr-1.9.94/libpcsxcore/debug.c:697:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "251 Mapping of read8 flow %s\r\n", code ? "started" : "stopped"); data/pcsxr-1.9.94/libpcsxcore/debug.c:703:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 152 command '%s'\r\n", cmd); data/pcsxr-1.9.94/libpcsxcore/debug.c:715:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "252 Mapping of read16 flow %s\r\n", code ? "started" : "stopped"); data/pcsxr-1.9.94/libpcsxcore/debug.c:721:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 153 command '%s'\r\n", cmd); data/pcsxr-1.9.94/libpcsxcore/debug.c:733:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "253 Mapping of read32 flow %s\r\n", code ? "started" : "stopped"); data/pcsxr-1.9.94/libpcsxcore/debug.c:739:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 154 command '%s'\r\n", cmd); data/pcsxr-1.9.94/libpcsxcore/debug.c:751:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "254 Mapping of write8 flow %s\r\n", code ? "started" : "stopped"); data/pcsxr-1.9.94/libpcsxcore/debug.c:757:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 155 command '%s'\r\n", cmd); data/pcsxr-1.9.94/libpcsxcore/debug.c:769:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "255 Mapping of write16 flow %s\r\n", code ? "started" : "stopped"); data/pcsxr-1.9.94/libpcsxcore/debug.c:775:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 156 command '%s'\r\n", cmd); data/pcsxr-1.9.94/libpcsxcore/debug.c:787:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "256 Mapping of write32 flow %s\r\n", code ? "started" : "stopped"); data/pcsxr-1.9.94/libpcsxcore/debug.c:793:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 160 command '%s'\r\n", cmd); data/pcsxr-1.9.94/libpcsxcore/debug.c:802:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "260 Break on map of exec flow %s\r\n", code ? "started" : "stopped"); data/pcsxr-1.9.94/libpcsxcore/debug.c:808:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 161 command '%s'\r\n", cmd); data/pcsxr-1.9.94/libpcsxcore/debug.c:817:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "261 Break on map of read8 flow %s\r\n", code ? "started" : "stopped"); data/pcsxr-1.9.94/libpcsxcore/debug.c:823:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 162 command '%s'\r\n", cmd); data/pcsxr-1.9.94/libpcsxcore/debug.c:832:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "262 Break on map of read16 flow %s\r\n", code ? "started" : "stopped"); data/pcsxr-1.9.94/libpcsxcore/debug.c:838:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 163 command '%s'\r\n", cmd); data/pcsxr-1.9.94/libpcsxcore/debug.c:847:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "263 Break on map of read32 flow %s\r\n", code ? "started" : "stopped"); data/pcsxr-1.9.94/libpcsxcore/debug.c:853:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 164 command '%s'\r\n", cmd); data/pcsxr-1.9.94/libpcsxcore/debug.c:862:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "264 Break on map of write8 flow %s\r\n", code ? "started" : "stopped"); data/pcsxr-1.9.94/libpcsxcore/debug.c:868:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 165 command '%s'\r\n", cmd); data/pcsxr-1.9.94/libpcsxcore/debug.c:877:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "265 Break on map of write16 flow %s\r\n", code ? "started" : "stopped"); data/pcsxr-1.9.94/libpcsxcore/debug.c:883:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 166 command '%s'\r\n", cmd); data/pcsxr-1.9.94/libpcsxcore/debug.c:892:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "266 Break on map of write32 flow %s\r\n", code ? "started" : "stopped"); data/pcsxr-1.9.94/libpcsxcore/debug.c:926:25: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "%s400 %X@%08X-%s\r\n", reply, bp->number, bp->address, breakpoint_type_names[bp->type]); data/pcsxr-1.9.94/libpcsxcore/debug.c:933:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "400 %X@%08X-%s\r\n", bp->number, bp->address, breakpoint_type_names[bp->type]); data/pcsxr-1.9.94/libpcsxcore/debug.c:958:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 310 command '%s'\r\n", arguments); data/pcsxr-1.9.94/libpcsxcore/debug.c:970:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 320 command '%s'\r\n", arguments); data/pcsxr-1.9.94/libpcsxcore/debug.c:982:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 321 command '%s'\r\n", arguments); data/pcsxr-1.9.94/libpcsxcore/debug.c:994:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 322 command '%s'\r\n", arguments); data/pcsxr-1.9.94/libpcsxcore/debug.c:1006:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 330 command '%s'\r\n", arguments); data/pcsxr-1.9.94/libpcsxcore/debug.c:1018:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 331 command '%s'\r\n", arguments); data/pcsxr-1.9.94/libpcsxcore/debug.c:1030:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Malformed 332 command '%s'\r\n", arguments); data/pcsxr-1.9.94/libpcsxcore/debug.c:1067:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "496 Printing %s\r\n", printpc ? "enabled" : "disabled"); data/pcsxr-1.9.94/libpcsxcore/debug.c:1082:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(reply, "500 Unknown command '%s'\r\n", cmd); data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:88:18: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. #define dName(i) sprintf(ostr, "%s %-7s,", ostr, i) data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:89:18: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. #define dGPR(i) sprintf(ostr, "%s %8.8x (%s),", ostr, psxRegs.GPR.r[i], disRNameGPR[i]) data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:90:18: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. #define dCP0(i) sprintf(ostr, "%s %8.8x (%s),", ostr, psxRegs.CP0.r[i], disRNameCP0[i]) data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:91:18: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. #define dCP2D(i) sprintf(ostr, "%s %8.8x (%s),", ostr, psxRegs.CP2D.r[i], disRNameCP2D[i]) data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:92:18: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. #define dCP2C(i) sprintf(ostr, "%s %8.8x (%s),", ostr, psxRegs.CP2C.r[i], disRNameCP2C[i]) data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:93:16: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. #define dHI() sprintf(ostr, "%s %8.8x (%s),", ostr, psxRegs.GPR.n.hi, "hi") data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:94:16: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. #define dLO() sprintf(ostr, "%s %8.8x (%s),", ostr, psxRegs.GPR.n.lo, "lo") data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:95:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. #define dImm() sprintf(ostr, "%s %4.4x (%d),", ostr, _Im_, _Im_) data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:96:19: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. #define dTarget() sprintf(ostr, "%s %8.8x,", ostr, _Target_) data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:97:16: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. #define dSa() sprintf(ostr, "%s %2.2x (%d),", ostr, _Sa_, _Sa_) data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:98:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. #define dOfB() sprintf(ostr, "%s %4.4x (%8.8x (%s)),", ostr, _Im_, psxRegs.GPR.r[_Rs_], disRNameGPR[_Rs_]) data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:99:19: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. #define dOffset() sprintf(ostr, "%s %8.8x,", ostr, _Branch_) data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:100:18: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. #define dCode() sprintf(ostr, "%s %8.8x,", ostr, (code >> 6) & 0xffffff) data/pcsxr-1.9.94/libpcsxcore/ix86/iR3000A.c:362:2: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system("ndisasmw -u dump1"); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:367:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cpuinfo.x86Fam,AMDspeedString); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:378:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cpuinfo.x86Fam,AMDspeedString); data/pcsxr-1.9.94/libpcsxcore/misc.c:390:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "%s/libps.exe", Config.BiosDir); data/pcsxr-1.9.94/libpcsxcore/plugins.c:740:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Cdr); data/pcsxr-1.9.94/libpcsxcore/plugins.c:744:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Gpu); data/pcsxr-1.9.94/libpcsxcore/plugins.c:747:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Spu); data/pcsxr-1.9.94/libpcsxcore/plugins.c:750:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Pad1); data/pcsxr-1.9.94/libpcsxcore/plugins.c:753:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Pad2); data/pcsxr-1.9.94/libpcsxcore/plugins.c:760:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Net); data/pcsxr-1.9.94/libpcsxcore/plugins.c:765:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Plugin, "%s/%s", Config.PluginsDir, Config.Sio1); data/pcsxr-1.9.94/libpcsxcore/ppf.c:210:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szPPF, "%s/%s", Config.PatchesDir, buffer); data/pcsxr-1.9.94/libpcsxcore/ppf.c:365:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(sbifile, "%s%s", Config.PatchesDir, buffer); data/pcsxr-1.9.94/libpcsxcore/psxbios.c:226:7: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. char system[4]; data/pcsxr-1.9.94/libpcsxcore/psxbios.c:980:15: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. ptmp += sprintf(ptmp, tmp2, (float)psxMu32(sp + n * 4)); n++; break; data/pcsxr-1.9.94/libpcsxcore/psxbios.c:984:15: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. ptmp += sprintf(ptmp, tmp2, (double)psxMu32(sp + n * 4)); n++; break; data/pcsxr-1.9.94/libpcsxcore/psxbios.c:990:15: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. ptmp += sprintf(ptmp, tmp2, (unsigned int)psxMu32(sp + n * 4)); n++; break; data/pcsxr-1.9.94/libpcsxcore/psxbios.c:992:15: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. ptmp += sprintf(ptmp, tmp2, (unsigned char)psxMu32(sp + n * 4)); n++; break; data/pcsxr-1.9.94/libpcsxcore/psxbios.c:994:15: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. ptmp += sprintf(ptmp, tmp2, (char*)PSXM(psxMu32(sp + n * 4))); n++; break; data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1640:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(FDesc[1 + mcd].name, Ra0+5); \ data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1666:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ptr+0xa, FDesc[1 + mcd].name); \ data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1870:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dir->name+i, ptr+i); break; } \ data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1897:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ffile, Ra0); data/pcsxr-1.9.94/libpcsxcore/psxcommon.c:70:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(emuLog, fmt, list); data/pcsxr-1.9.94/libpcsxcore/psxcommon.c:72:2: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(tmp, fmt, list); data/pcsxr-1.9.94/libpcsxcore/psxcounters.c:101:9: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf( buf, sizeof(buf), str, va ); data/pcsxr-1.9.94/libpcsxcore/psxmem.c:117:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(bios, "%s/%s", Config.BiosDir, Config.Bios); data/pcsxr-1.9.94/libpcsxcore/socket.c:122:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(hello, "000 PCSXR Version %s - Debug console\r\n", PACKAGE_VERSION); data/pcsxr-1.9.94/macosx/Plugin.c:73:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dst, ptr+1); \ data/pcsxr-1.9.94/macosx/Plugin.c:106:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(info.EmuName, "PCSX " PACKAGE_VERSION); data/pcsxr-1.9.94/macosx/Plugin.c:114:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(path, "%s%s", Config.BiosDir, Config.Bios); data/pcsxr-1.9.94/macosx/Plugin.c:115:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(info.BIOSpath, path); data/pcsxr-1.9.94/macosx/Plugin.c:116:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(info.MCD1path, Config.Mcd1); data/pcsxr-1.9.94/macosx/Plugin.c:117:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(info.MCD2path, Config.Mcd2); data/pcsxr-1.9.94/macosx/Plugin.c:118:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(path, "%s%s", Config.PluginsDir, Config.Gpu); data/pcsxr-1.9.94/macosx/Plugin.c:119:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(info.GPUpath, path); data/pcsxr-1.9.94/macosx/Plugin.c:120:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(path, "%s%s", Config.PluginsDir, Config.Spu); data/pcsxr-1.9.94/macosx/Plugin.c:121:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(info.SPUpath, path); data/pcsxr-1.9.94/macosx/Plugin.c:122:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(path, "%s%s", Config.PluginsDir, Config.Cdr); data/pcsxr-1.9.94/macosx/Plugin.c:123:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(info.CDRpath, path); data/pcsxr-1.9.94/macosx/Plugin.c:138:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.Mcd1, info.MCD1path); data/pcsxr-1.9.94/macosx/Plugin.c:139:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.Mcd2, info.MCD2path); data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:110:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dev, psz_buf); data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:137:37: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (dev != NULL && dev[0] != '\0') strcpy(cdDevice, dev); data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:149:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, KeyString[i].desc); data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:176:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, _("Joystick: Hat %d %s"), (g.cfg.PadDef[joynum].KeyDef[key].J.Hat >> 8), data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:193:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buf, keyboardBuf); data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:210:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, _("Joystick: Hat %d %s"), (g.cfg.PadDef[joynum].AnalogDef[analognum][dir].J.Hat >> 8), data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:227:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buf, keyboardBuf); data/pcsxr-1.9.94/plugins/bladesio1/gui.c:65:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(IPAddress, inet_ntoa(addr.sin_addr)); data/pcsxr-1.9.94/plugins/bladesio1/gui.c:84:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(IPAddress, inet_ntoa(*((struct in_addr *)host->h_addr_list[0]))); data/pcsxr-1.9.94/plugins/bladesio1/gui.c:96:2: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(msg, fmt, list); data/pcsxr-1.9.94/plugins/bladesio1/sio1.c:558:5: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(cfg, "cfgBladeSio1", arg, NULL); data/pcsxr-1.9.94/plugins/bladesio1/sio1.c:572:5: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(cfg, "cfgBladeSio1", arg, NULL); data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:480:5: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(cfg, "cfgDFCdrom", arg, NULL); data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:494:5: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(cfg, "cfgDFCdrom", arg, NULL); data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:220:16: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define PRINTF printf data/pcsxr-1.9.94/plugins/dfcdrom/cdrcfg-0.1df/main.c:131:7: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. fp = popen("eject -l", "r"); data/pcsxr-1.9.94/plugins/dfcdrom/cdrcfg-0.1df/main.c:143:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cdrom_devices[i++], devname); data/pcsxr-1.9.94/plugins/dfcdrom/cfg.c:38:6: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. f = popen("eject -l", "r"); data/pcsxr-1.9.94/plugins/dfcdrom/cfg.c:50:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(CdromDev, devname); data/pcsxr-1.9.94/plugins/dfcdrom/cfg.c:58:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(CdromDev, DEV_DEF); data/pcsxr-1.9.94/plugins/dfcdrom/cfg.c:70:2: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(f, "CdromDev = %s\n", CdromDev); data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:137:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, _("Joystick: Hat %d %s"), (keydef->J.Hat >> 8), data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:154:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buf, XKeysymToString(keydef->Key)); data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:176:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, _("Joystick: Hat %d %s"), (g.cfg.PadDef[joynum].AnalogDef[analognum][dir].J.Hat >> 8), data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:193:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buf, XKeysymToString(g.cfg.PadDef[joynum].AnalogDef[analognum][dir].Key)); data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:610:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "%d: %s", j + 1, SDL_JoystickName(j)); data/pcsxr-1.9.94/plugins/dfinput/pad.c:662:4: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl("cfg/cfgDFInput", "cfgDFInput", "configure", NULL); data/pcsxr-1.9.94/plugins/dfinput/pad.c:677:4: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl("cfg/cfgDFInput", "cfgDFInput", "about", NULL); data/pcsxr-1.9.94/plugins/dfinput/xkb.c:50:20: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (pclose(popen(buf, "r")) == 0) { data/pcsxr-1.9.94/plugins/dfinput/xkb.c:83:25: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. FILE *phandle = popen(buf, "r"); data/pcsxr-1.9.94/plugins/dfnet/gui.c:24:2: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(msg, fmt, list); data/pcsxr-1.9.94/plugins/dfnet/gui.c:64:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(IPAddress, inet_ntoa(addr.sin_addr)); data/pcsxr-1.9.94/plugins/dfnet/gui.c:83:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(IPAddress, inet_ntoa(*((struct in_addr *)host->h_addr_list[0]))); data/pcsxr-1.9.94/plugins/dfnet/gui.c:135:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(conf.ipAddress, gtk_entry_get_text(GTK_ENTRY(widget))); data/pcsxr-1.9.94/plugins/dfnet/gui.c:199:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(msg, *args); strcat(msg, " "); data/pcsxr-1.9.94/plugins/dfnet/unix.c:27:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cfg, arg); data/pcsxr-1.9.94/plugins/dfnet/unix.c:30:22: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (fork() == 0) { system(cfg); exit(0); } data/pcsxr-1.9.94/plugins/dfnet/unix.c:34:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. return system(cfg); data/pcsxr-1.9.94/plugins/dfnet/unix.c:71:2: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(msg, fmt, list); data/pcsxr-1.9.94/plugins/dfnet/unix.c:74:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(cmd, "message %s\n", msg); data/pcsxr-1.9.94/plugins/dfnet/unix.c:105:3: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl("cfg/cfgDFNet", "cfgDFNet", "wait", NULL); data/pcsxr-1.9.94/plugins/dfsound/cfg.c:50:8: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl("./cfgDFSound","cfgDFSound",pCmdLine,NULL); data/pcsxr-1.9.94/plugins/dfsound/cfg.c:78:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(t,"%s/dfsound.cfg",getenv("HOME")); data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:108:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cfg, CONFIG_FILENAME); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:65:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. size+=sprintf(pB+size, "%s = %d\n", name, var); \ data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:80:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. size+=sprintf(pB+size, "%s = %.1f\n", name, (double)var); \ data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:90:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(t,pConfigFile); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:99:14: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if(!in) sprintf(t,"%s/.pcsxr/plugins/dfxvideo.cfg",getenv("HOME")); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:178:5: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(cfg, "cfgDFXVideo", arg, NULL); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:192:5: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(cfg, "cfgDFXVideo", arg, NULL); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:201:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(cfg, "%s/.pcsxr/plugins/cfg/cfgDFXVideo", getenv("HOME")); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:206:5: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(cfg, "cfgDFXVideo", arg, NULL); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:262:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(t,pConfigFile); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:271:15: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if(!out) sprintf(t,"%s/.pcsxr/plugins/dfxvideo.cfg",getenv("HOME")); data/pcsxr-1.9.94/plugins/dfxvideo/draw.c:1653:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(szDispBuf,szDebugText); data/pcsxr-1.9.94/plugins/dfxvideo/draw.c:1658:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(szDispBuf,szMenuBuf); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:215:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(szDebugText,pText); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:263:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"Plugin: %s %d.%d.%d\r\n",libraryName,version,revision,build); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:264:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:265:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"Author: %s\r\n\r\n",PluginAuthor); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:266:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:272:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:280:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:283:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:285:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:287:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"Framerate:\r\n- FPS limit: %s\r\n",szO[UseFrameLimit]); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:288:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:289:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"- Frame skipping: %s",szO[UseFrameSkip]); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:290:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:296:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:304:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:306:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"- Game fixes: %s [%08x]\r\n",szO[iUseFixes],dwCfgFixes); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:307:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:321:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"%s/pcsxr%04d.txt",getenv("HOME"),iNum); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:383:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "%s/pcsxr%04ld.bmp", getenv("HOME"), snapshotnr); data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:159:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cfg, CONFIG_FILENAME); data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:355:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(pC,p); data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:356:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ps,t); data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:357:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,pC); data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:362:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,pE); data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:364:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,t); data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:380:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cfg, CONFIG_FILENAME); data/pcsxr-1.9.94/plugins/dfxvideo/menu.c:90:4: [4] (buffer) lstrcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). lstrcat(szDispBuf,szMenuBuf); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:229:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"Plugin: %s %d.%d.%d (mod)\r\n",libraryName,version,revision,build); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:230:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:231:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"Author: %s\r\n",PluginAuthor); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:232:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:244:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"Card vendor: %s\r\n",(char *)glGetString(GL_VENDOR)); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:245:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:246:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"GFX card: %s\r\n",(char *)glGetString(GL_RENDERER)); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:247:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:248:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"OGL version: %s\r\n\r\n",(char *)glGetString(GL_VERSION)); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:249:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:267:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:272:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:276:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:278:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if(iForceVSync>=0) sprintf(szTxt,"- V-Sync: %s\r\n",szO[iForceVSync]); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:280:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:281:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"- Keep psx aspect ratio: %s\r\n\r\n",szO[bKeepRatio]); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:282:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:292:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:300:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:302:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:305:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"- Palettized tex windows: %s\r\n",szO[iUsePalTextures]); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:306:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:312:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:314:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"Framerate:\r\n- FPS limitation: %s\r\n",szO[bUseFrameLimit]); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:315:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:316:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"- Frame skipping: %s\r\n",szO[bUseFrameSkip]); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:317:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:321:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:324:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:332:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:334:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:335:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"- Alpha multipass: %s\r\n",szO[bOpaquePass]); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:336:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:337:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"- Mask bit: %s\r\n",szO[iUseMask]); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:338:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:339:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"- Advanced blending: %s",szO[bAdvancedBlend]); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:346:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:361:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:363:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"Misc:\r\n- Scanlines: %s",szO[iUseScanLines]); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:364:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:367:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:368:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"- Line mode: %s\r\n",szO[bUseLines]); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:369:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:372:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"- Unfiltered FB: %s\r\n",szO[bUseFastMdec]); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:373:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:374:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"- 15 bit FB: %s\r\n",szO[bUse15bitMdec]); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:375:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:376:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"- Dithering: %s\r\n",szO[bDrawDither]); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:377:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:378:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"- Screen smoothing: %s",szO[iBlurBuffer]); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:379:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:386:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"- Game fixes: %s [%08x]\r\n",szO[bUseFixes],dwCfgFixes); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:387:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(pB,szTxt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:403:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(szTxt,"%s/pcsxr%04d.txt",getenv("HOME"),iNum); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:472:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename,"%s/pcsxr%04d.bmp",getenv("HOME"),snapshotnr); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3023:5: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(cfg, "cfgpeopsxgl", arg, NULL); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3037:5: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(cfg, "cfgpeopsxgl", arg, NULL); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3046:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(cfg, "%s/.pcsxr/plugins/cfg/cfgpeopsxgl", getenv("HOME")); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3051:5: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(cfg, "cfgpeopsxgl", arg, NULL); data/pcsxr-1.9.94/win32/gui/CheatDlg.c:79:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(szCode, szDescr); data/pcsxr-1.9.94/win32/gui/CheatDlg.c:728:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(p, buf); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:100:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(text, "LANGUAGE=%s", Conf->Lang); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:157:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(lp, "%s", FindData.cFileName); \ data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:182:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmpStr, Config.PluginsDir); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:188:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmpStr,"%s%s", Config.PluginsDir, FindData.cFileName); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:199:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmpStr, "%s %d.%d", PSE_GetLibName(), (int)(version>>8)&0xff, (int)version&0xff); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:245:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmpStr, Config.BiosDir); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:255:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(lp, "%s", (char *)FindData.cFileName); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:260:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.Bios, FindData.cFileName); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:340:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.Bios, biosFILE); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:341:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.Gpu, gpuDLL); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:342:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.Spu, spuDLL); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:344:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.Cdr, cdrDLL); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:347:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.Pad1, pad1DLL); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:348:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.Pad2, pad2DLL); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:350:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.Sio1, sio1DLL); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:370:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(file, Config.PluginsDir); \ data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:371:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(file, pDLL); \ data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:446:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(file, Config.PluginsDir); \ data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:447:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(file, pDLL); \ data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:519:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.PluginsDir, Path); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:528:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.BiosDir, Path); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:632:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmpStr, Config.PluginsDir); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:644:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmpStr,"%s%s", Config.PluginsDir, FindData.cFileName); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:655:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmpStr, "%s %d.%d", PSE_GetLibName(), (int)(version>>8)&0xff, (int)version&0xff); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:699:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.Net, GetSelDLL(hW, IDC_LISTNET)); data/pcsxr-1.9.94/win32/gui/WndMain.c:118:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.Lang, sLangs[i].id); data/pcsxr-1.9.94/win32/gui/WndMain.c:131:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dst + len, src); data/pcsxr-1.9.94/win32/gui/WndMain.c:168:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(text, "LANGUAGE=%s", Config.Lang); data/pcsxr-1.9.94/win32/gui/WndMain.c:204:23: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (arg != NULL) strcpy(cdfile, arg); data/pcsxr-1.9.94/win32/gui/WndMain.c:206:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cdfile, arg); data/pcsxr-1.9.94/win32/gui/WndMain.c:378:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Text, _("*PCSXR*: Loaded State %s"), szFileName); data/pcsxr-1.9.94/win32/gui/WndMain.c:379:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(Text, _("*PCSXR*: Error Loading State %s"), szFileName); data/pcsxr-1.9.94/win32/gui/WndMain.c:424:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Text, _("*PCSXR*: Saved State %s"), szFileName); data/pcsxr-1.9.94/win32/gui/WndMain.c:425:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(Text, _("*PCSXR*: Error Saving State %s"), szFileName); data/pcsxr-1.9.94/win32/gui/WndMain.c:1562:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(file, szFileName); data/pcsxr-1.9.94/win32/gui/WndMain.c:1605:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(file, szFileName); data/pcsxr-1.9.94/win32/gui/WndMain.c:1627:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, string); \ data/pcsxr-1.9.94/win32/gui/WndMain.c:1635:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, string); \ data/pcsxr-1.9.94/win32/gui/WndMain.c:1710:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(langs[i].lang, lang); data/pcsxr-1.9.94/win32/gui/WndMain.c:1823:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.Lang, lang); data/pcsxr-1.9.94/win32/gui/WndMain.c:1875:2: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(msg,fmt,list); data/pcsxr-1.9.94/win32/gui/WndMain.c:1891:2: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(tmp,fmt,list); data/pcsxr-1.9.94/win32/gui/plugin.c:210:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dst, ptr+1); \ data/pcsxr-1.9.94/win32/gui/plugin.c:226:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(info.EmuName, "PCSXR " PACKAGE_VERSION); data/pcsxr-1.9.94/win32/gui/plugin.c:234:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(path, "%s%s", Config.BiosDir, Config.Bios); data/pcsxr-1.9.94/win32/gui/plugin.c:235:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(info.BIOSpath, path); data/pcsxr-1.9.94/win32/gui/plugin.c:236:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(info.MCD1path, Config.Mcd1); data/pcsxr-1.9.94/win32/gui/plugin.c:237:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(info.MCD2path, Config.Mcd2); data/pcsxr-1.9.94/win32/gui/plugin.c:238:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(path, "%s%s", Config.PluginsDir, Config.Gpu); data/pcsxr-1.9.94/win32/gui/plugin.c:239:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(info.GPUpath, path); data/pcsxr-1.9.94/win32/gui/plugin.c:240:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(path, "%s%s", Config.PluginsDir, Config.Spu); data/pcsxr-1.9.94/win32/gui/plugin.c:241:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(info.SPUpath, path); data/pcsxr-1.9.94/win32/gui/plugin.c:242:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(path, "%s%s", Config.PluginsDir, Config.Cdr); data/pcsxr-1.9.94/win32/gui/plugin.c:243:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(info.CDRpath, path); data/pcsxr-1.9.94/win32/gui/plugin.c:258:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.Mcd1, info.MCD1path); data/pcsxr-1.9.94/win32/gui/plugin.c:259:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Config.Mcd2, info.MCD2path); data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:636:2: [4] (buffer) lstrcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. lstrcpy(szGPUKeys,szKeyDefaults); data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c:633:2: [4] (buffer) lstrcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. lstrcpy(szGPUKeys,szKeyDefaults); data/pcsxr-1.9.94/win32/zlib/gzio.c:112:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s->path, path); /* do this early for debugging */ data/pcsxr-1.9.94/win32/zlib/gzio.c:537:11: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. (void)vsnprintf(buf, sizeof(buf), format, va); data/pcsxr-1.9.94/win32/zlib/gzio.c:539:11: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. (void)vsprintf(buf, format, va); data/pcsxr-1.9.94/win32/zlib/gzio.c:560:5: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, sizeof(buf), format, a1, a2, a3, a4, a5, a6, a7, a8, data/pcsxr-1.9.94/win32/zlib/gzio.c:563:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, format, a1, a2, a3, a4, a5, a6, a7, a8, data/pcsxr-1.9.94/win32/zlib/gzio.c:875:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s->msg, s->path); data/pcsxr-1.9.94/win32/zlib/gzio.c:877:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s->msg, m); data/pcsxr-1.9.94/win32/zlib/zutil.h:195:39: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Trace(x) {if (z_verbose>=0) fprintf x ;} data/pcsxr-1.9.94/win32/zlib/zutil.h:196:39: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Tracev(x) {if (z_verbose>0) fprintf x ;} data/pcsxr-1.9.94/win32/zlib/zutil.h:197:40: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Tracevv(x) {if (z_verbose>1) fprintf x ;} data/pcsxr-1.9.94/win32/zlib/zutil.h:198:48: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Tracec(c,x) {if (z_verbose>0 && (c)) fprintf x ;} data/pcsxr-1.9.94/win32/zlib/zutil.h:199:49: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Tracecv(c,x) {if (z_verbose>1 && (c)) fprintf x ;} data/pcsxr-1.9.94/gui/Cheat.c:317:30: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. filename = g_build_filename(getenv("HOME"), CHEATS_DIR, NULL); data/pcsxr-1.9.94/gui/Cheat.c:361:30: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. filename = g_build_filename(getenv("HOME"), CHEATS_DIR, NULL); data/pcsxr-1.9.94/gui/ConfDlg.c:389:32: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. filename = g_build_filename (getenv("HOME"), PLUGINS_DIR, plugin, NULL); \ data/pcsxr-1.9.94/gui/ConfDlg.c:586:27: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. pluginfile = g_strconcat(getenv("HOME"), PLUGINS_DIR, plugin, NULL); data/pcsxr-1.9.94/gui/Config.c:84:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. strncpy(cfgfile, getenv("HOME"), 200); data/pcsxr-1.9.94/gui/DebugMemory.c:202:72: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. gtk_file_chooser_set_current_folder(GTK_FILE_CHOOSER(file_chooser), getenv("HOME")); data/pcsxr-1.9.94/gui/GtkGui.c:219:37: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. state_filename = g_build_filename (getenv("HOME"), STATES_DIR, SStateFile, NULL); data/pcsxr-1.9.94/gui/GtkGui.c:268:48: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. gchar *defaultChtFilePath = g_build_filename (getenv("HOME"), CHEATS_DIR, chtfile, NULL); data/pcsxr-1.9.94/gui/GtkGui.c:550:71: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. gtk_file_chooser_set_current_folder(GTK_FILE_CHOOSER(file_chooser), getenv("HOME")); data/pcsxr-1.9.94/gui/GtkGui.c:672:26: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. strcpy(current_folder, getenv("HOME")); data/pcsxr-1.9.94/gui/GtkGui.c:886:28: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. dotdir = g_build_filename(getenv("HOME"), PLUGINS_DIR, NULL); data/pcsxr-1.9.94/gui/GtkGui.c:1017:27: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. SStateFile = g_strconcat(getenv("HOME"), STATES_DIR, NULL); data/pcsxr-1.9.94/gui/GtkGui.c:1045:28: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. SStateFile = g_strconcat (getenv("HOME"), STATES_DIR, NULL); data/pcsxr-1.9.94/gui/LnxMain.c:56:25: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. mcd = g_build_filename(getenv("HOME"), MEMCARD_DIR, filename, NULL); data/pcsxr-1.9.94/gui/LnxMain.c:74:39: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. gchar *dir_name = g_build_filename (getenv("HOME"), directory, NULL); data/pcsxr-1.9.94/gui/LnxMain.c:113:34: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. linkname = g_build_filename (getenv("HOME"), PLUGINS_DIR, ent->d_name, NULL); data/pcsxr-1.9.94/gui/LnxMain.c:120:35: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. linkname = g_build_filename (getenv("HOME"), PLUGINS_CFG_DIR, ent->d_name, NULL); data/pcsxr-1.9.94/gui/LnxMain.c:151:33: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. linkname = g_build_filename(getenv("HOME"), BIOS_DIR, ent->d_name, NULL); data/pcsxr-1.9.94/gui/LnxMain.c:243:27: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. currentdir = g_strconcat(getenv("HOME"), "/.psemu-plugins/", NULL); data/pcsxr-1.9.94/gui/LnxMain.c:247:27: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. currentdir = g_strconcat(getenv("HOME"), "/.psemu/", NULL); data/pcsxr-1.9.94/gui/LnxMain.c:252:32: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. currentdir = g_build_filename(getenv("HOME"), PLUGINS_DIR, NULL); data/pcsxr-1.9.94/gui/LnxMain.c:257:32: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. currentdir = g_build_filename(getenv("HOME"), PLUGINS_CFG_DIR, NULL); data/pcsxr-1.9.94/gui/LnxMain.c:262:32: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. currentdir = g_build_filename(getenv("HOME"), BIOS_DIR, NULL); data/pcsxr-1.9.94/gui/LnxMain.c:376:37: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. gchar *str_bios_dir = g_strconcat(getenv("HOME"), BIOS_DIR, NULL); data/pcsxr-1.9.94/gui/LnxMain.c:380:39: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. gchar *str_plugin_dir = g_strconcat(getenv("HOME"), PLUGINS_DIR, NULL); data/pcsxr-1.9.94/gui/LnxMain.c:407:39: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. gchar *str_patches_dir = g_strconcat(getenv("HOME"), PATCHES_DIR, NULL); data/pcsxr-1.9.94/gui/LnxMain.c:413:47: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. gchar *plugin_default_dir = g_build_filename(getenv("HOME"), PLUGINS_DIR, NULL); data/pcsxr-1.9.94/gui/MemcardDlg.c:379:26: [3] (buffer) g_get_home_dir: This function is synonymous with 'getenv("HOME")';it returns untrustable input if the environment can beset by an attacker. It can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. path = g_build_filename(g_get_home_dir(), ".pcsxr", "memcards", NULL); data/pcsxr-1.9.94/gui/MemcardDlg.c:677:21: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. str = g_strconcat(getenv("HOME"), DEFAULT_MEM_CARD_1, NULL); data/pcsxr-1.9.94/gui/MemcardDlg.c:683:21: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. str = g_strconcat(getenv("HOME"), DEFAULT_MEM_CARD_2, NULL); data/pcsxr-1.9.94/gui/Plugin.c:365:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. strncpy(dotdir, getenv("HOME"), MAXPATHLEN-100); data/pcsxr-1.9.94/plugins/dfinput/pad.c:260:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. sdlj = getenv("SDL_JOYSTICK_DEVICE"); data/pcsxr-1.9.94/plugins/dfsound/cfg.c:78:33: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. sprintf(t,"%s/dfsound.cfg",getenv("HOME")); data/pcsxr-1.9.94/plugins/dfsound/stdafx.h:51:23: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define RRand(range) (random()%range) data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:99:57: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if(!in) sprintf(t,"%s/.pcsxr/plugins/dfxvideo.cfg",getenv("HOME")); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:201:52: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. sprintf(cfg, "%s/.pcsxr/plugins/cfg/cfgDFXVideo", getenv("HOME")); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:271:58: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if(!out) sprintf(t,"%s/.pcsxr/plugins/dfxvideo.cfg",getenv("HOME")); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:165:22: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. kernel32LibHandle = LoadLibrary("kernel32.dll"); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:321:35: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. sprintf(szTxt,"%s/pcsxr%04d.txt",getenv("HOME"),iNum); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:383:43: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. sprintf(filename, "%s/pcsxr%04ld.bmp", getenv("HOME"), snapshotnr); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:403:35: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. sprintf(szTxt,"%s/pcsxr%04d.txt",getenv("HOME"),iNum); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:472:40: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. sprintf(filename,"%s/pcsxr%04d.bmp",getenv("HOME"),snapshotnr); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:801:8: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. glxfx=getenv("MESA_GLX_FX"); // 3dfx mesa fullscreen flag data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3046:52: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. sprintf(cfg, "%s/.pcsxr/plugins/cfg/cfgpeopsxgl", getenv("HOME")); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3577:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(timeGetTime()); // init rand (will be used in BufferSwap) data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:189:10: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. Lib = LoadLibrary(tmpStr); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:645:10: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. Lib = LoadLibrary(tmpStr); data/pcsxr-1.9.94/win32/gui/WndMain.c:1900:9: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. return LoadLibrary(lib); data/pcsxr-1.9.94/win32/intl/dcgettext.c:50:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *getenv (); data/pcsxr-1.9.94/win32/intl/dcgettext.c:97:7: [3] (buffer) getwd: This does not protect against buffer overflows by itself, so use with caution (CWE-120, CWE-20). Use getcwd instead. char *getwd (); data/pcsxr-1.9.94/win32/intl/dcgettext.c:98:28: [3] (buffer) getwd: This does not protect against buffer overflows by itself, so use with caution (CWE-120, CWE-20). Use getcwd instead. # define getcwd(buf, max) getwd (buf) data/pcsxr-1.9.94/win32/intl/dcgettext.c:550:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. retval = getenv ("LANGUAGE"); data/pcsxr-1.9.94/win32/intl/dcgettext.c:561:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. retval = getenv ("LC_ALL"); data/pcsxr-1.9.94/win32/intl/dcgettext.c:566:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. retval = getenv (categoryname); data/pcsxr-1.9.94/win32/intl/dcgettext.c:571:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. retval = getenv ("LANG"); data/pcsxr-1.9.94/win32/intl/localealias.c:45:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *getenv (); data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/winmain.c:31:16: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. hDDrawDLL = LoadLibrary(TEXT("DDRAW.DLL")); data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/ssave.c:46:16: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. hKernel32 = LoadLibrary("kernel32.dll"); data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/ssave.c:56:16: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. hKernel32 = LoadLibrary("kernel32.dll"); data/pcsxr-1.9.94/gui/Cheat.c:168:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8192]; data/pcsxr-1.9.94/gui/Cheat.c:209:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(p, "%.8X %.4X\n", CheatCodes[i].Addr, CheatCodes[i].Val); data/pcsxr-1.9.94/gui/Cheat.c:293:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int i = atoi(path_str); data/pcsxr-1.9.94/gui/Cheat.c:518:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/pcsxr-1.9.94/gui/Cheat.c:532:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%u", current_valuefrom); data/pcsxr-1.9.94/gui/Cheat.c:534:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%u", current_valueto); data/pcsxr-1.9.94/gui/Cheat.c:538:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%X", current_valuefrom); data/pcsxr-1.9.94/gui/Cheat.c:540:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%X", current_valueto); data/pcsxr-1.9.94/gui/Cheat.c:586:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, _("%.8X Current: %u (%.2X), Previous: %u (%.2X)"), data/pcsxr-1.9.94/gui/Cheat.c:591:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, _("%.8X Current: %u (%.4X), Previous: %u (%.4X)"), data/pcsxr-1.9.94/gui/Cheat.c:596:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, _("%.8X Current: %u (%.8X), Previous: %u (%.8X)"), data/pcsxr-1.9.94/gui/Cheat.c:611:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, _("Founded Addresses: %d"), NumSearchResults); data/pcsxr-1.9.94/gui/Cheat.c:656:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/pcsxr-1.9.94/gui/Cheat.c:704:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%u", val); data/pcsxr-1.9.94/gui/Cheat.c:707:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%.8X", addr); data/pcsxr-1.9.94/gui/Cheat.c:722:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%.8X %.4X", (addr & 0x1FFFFF) | (CHEAT_CONST8 << 24), val); data/pcsxr-1.9.94/gui/Cheat.c:729:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%.8X %.4X", (addr & 0x1FFFFF) | (CHEAT_CONST16 << 24), val); data/pcsxr-1.9.94/gui/Cheat.c:733:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%.8X %.4X\n%.8X %.4X", data/pcsxr-1.9.94/gui/Cheat.c:755:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/pcsxr-1.9.94/gui/Cheat.c:794:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%u", val); data/pcsxr-1.9.94/gui/Cheat.c:837:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[9]; data/pcsxr-1.9.94/gui/Cheat.c:842:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%8X", SearchResults[i]); data/pcsxr-1.9.94/gui/Cheat.c:1091:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/pcsxr-1.9.94/gui/Cheat.c:1096:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%u", val); data/pcsxr-1.9.94/gui/Cheat.c:1101:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%u", val); data/pcsxr-1.9.94/gui/Cheat.c:1107:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%X", val); data/pcsxr-1.9.94/gui/Cheat.c:1112:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%X", val); data/pcsxr-1.9.94/gui/ConfDlg.c:85:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. strcpy(conf, (char *)list[row * 2]); \ data/pcsxr-1.9.94/gui/ConfDlg.c:243:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Plugin[MAXPATHLEN]; data/pcsxr-1.9.94/gui/ConfDlg.c:264:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Plugin[MAXPATHLEN]; data/pcsxr-1.9.94/gui/ConfDlg.c:285:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Plugin[MAXPATHLEN]; data/pcsxr-1.9.94/gui/ConfDlg.c:306:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Plugin[MAXPATHLEN]; data/pcsxr-1.9.94/gui/ConfDlg.c:327:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Plugin[MAXPATHLEN]; data/pcsxr-1.9.94/gui/ConfDlg.c:664:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[256]; data/pcsxr-1.9.94/gui/ConfDlg.c:734:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ver[32]; data/pcsxr-1.9.94/gui/ConfDlg.c:737:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ver, " %ld.%ld.%ld", v >> 16, (v >> 8) & 0xff, v & 0xff); data/pcsxr-1.9.94/gui/ConfDlg.c:789:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char plugin[MAXPATHLEN],name[MAXPATHLEN]; data/pcsxr-1.9.94/gui/ConfDlg.c:795:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(NetConfS.plist[NetConfS.plugins - 1], "Disabled"); data/pcsxr-1.9.94/gui/ConfDlg.c:796:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(NetConfS.plist[NetConfS.plugins - 2], "Disabled"); data/pcsxr-1.9.94/gui/ConfDlg.c:826:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ver[32]; data/pcsxr-1.9.94/gui/ConfDlg.c:829:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ver, " %ld.%ld.%ld",v>>16,(v>>8)&0xff,v&0xff); data/pcsxr-1.9.94/gui/ConfDlg.h:39:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char plist[255][255]; /* TODO Comment this out */ data/pcsxr-1.9.94/gui/Config.c:50:28: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (*tmp != '\n') return atol(tmp); data/pcsxr-1.9.94/gui/Config.c:60:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (*tmp != '\n') return (atoi(tmp) != 0); data/pcsxr-1.9.94/gui/Config.c:102:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(cfgfile, "r"); data/pcsxr-1.9.94/gui/Config.c:156:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(cfgfile, "w"); data/pcsxr-1.9.94/gui/DebugMemory.c:32:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buftext[20]; data/pcsxr-1.9.94/gui/DebugMemory.c:35:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buftext, "%.8X", MemViewAddress | 0x80000000); data/pcsxr-1.9.94/gui/DebugMemory.c:43:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bufaddr[9], bufdata[16][3], buftext[17]; data/pcsxr-1.9.94/gui/DebugMemory.c:68:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(bufaddr, "%.8X", start | 0x80000000); data/pcsxr-1.9.94/gui/DebugMemory.c:72:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(bufdata[i], "%.2X", (u8)buftext[i]); data/pcsxr-1.9.94/gui/DebugMemory.c:150:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[10]; data/pcsxr-1.9.94/gui/DebugMemory.c:166:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%.8X", MemViewAddress | 0x80000000); data/pcsxr-1.9.94/gui/DebugMemory.c:206:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen(file, "wb"); data/pcsxr-1.9.94/gui/DebugMemory.c:228:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[12]; data/pcsxr-1.9.94/gui/DebugMemory.c:244:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%.8X", MemViewAddress | 0x80000000); data/pcsxr-1.9.94/gui/DebugMemory.c:254:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%.2X", MemViewValue); data/pcsxr-1.9.94/gui/DebugMemory.c:330:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[2]; data/pcsxr-1.9.94/gui/GtkGui.c:213:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char SStateFile[64]; data/pcsxr-1.9.94/gui/GtkGui.c:218:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(SStateFile, "%.32s-%.9s.%3.3d", trimlabel, CdromId, i); data/pcsxr-1.9.94/gui/GtkGui.c:227:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trimlabel[33]; data/pcsxr-1.9.94/gui/GtkGui.c:245:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[lblmax]; data/pcsxr-1.9.94/gui/GtkGui.c:662:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char current_folder[MAXPATHLEN] = ""; data/pcsxr-1.9.94/gui/GtkGui.c:916:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Text[MAXPATHLEN + 20]; data/pcsxr-1.9.94/gui/GtkGui.c:920:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(state_filename, "rb"); data/pcsxr-1.9.94/gui/GtkGui.c:962:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Text[MAXPATHLEN + 20]; data/pcsxr-1.9.94/gui/GtkGui.c:1076:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[512]; data/pcsxr-1.9.94/gui/Linux.h:42:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cfgfile[MAXPATHLEN]; /* ADB Comment this out - make a local var, or at least use gchar funcs */ data/pcsxr-1.9.94/gui/Linux.h:43:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cfgfile_basename[MAXPATHLEN]; /* ADB Comment this out - make a local var, or at least use gchar funcs */ data/pcsxr-1.9.94/gui/LnxMain.c:277:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file[MAXPATHLEN] = ""; data/pcsxr-1.9.94/gui/LnxMain.c:278:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAXPATHLEN]; data/pcsxr-1.9.94/gui/LnxMain.c:294:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cfgfile_basename, "pcsxr.cfg"); data/pcsxr-1.9.94/gui/LnxMain.c:302:48: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). else if (!strcmp(argv[i], "-load")) loadst = atol(argv[++i]); data/pcsxr-1.9.94/gui/LnxMain.c:309:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char isofilename[MAXPATHLEN]; data/pcsxr-1.9.94/gui/LnxMain.c:358:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(Config.Net, "Disabled"); data/pcsxr-1.9.94/gui/LnxMain.c:469:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). emuLog = fopen("emuLog.txt","wb"); data/pcsxr-1.9.94/gui/LnxMain.c:515:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[512]; data/pcsxr-1.9.94/gui/MemcardDlg.c:447:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(to + (dsti + 1) * 128, from + (srci + 1) * 128, 128); data/pcsxr-1.9.94/gui/MemcardDlg.c:451:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(to + (dsti + 1) * 1024 * 8, from + (srci+1) * 1024 * 8, 1024 * 8); data/pcsxr-1.9.94/gui/Plugin.c:68:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pMem, NoPic_Image.pixel_data, 128*96*3); data/pcsxr-1.9.94/gui/Plugin.c:111:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Text[MAXPATHLEN]; data/pcsxr-1.9.94/gui/Plugin.c:253:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(Text, _("SIO IRQ Always Enabled")); data/pcsxr-1.9.94/gui/Plugin.c:254:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(Text, _("SIO IRQ Not Always Enabled")); data/pcsxr-1.9.94/gui/Plugin.c:260:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(Text, _("Black & White Mdecs Only Enabled")); data/pcsxr-1.9.94/gui/Plugin.c:261:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(Text, _("Black & White Mdecs Only Disabled")); data/pcsxr-1.9.94/gui/Plugin.c:267:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (Text, _("XA Enabled")); data/pcsxr-1.9.94/gui/Plugin.c:268:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf (Text, _("XA Disabled")); data/pcsxr-1.9.94/gui/Plugin.c:362:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAXPATHLEN]; data/pcsxr-1.9.94/gui/Plugin.c:363:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dotdir[MAXPATHLEN]; data/pcsxr-1.9.94/gui/Plugin.c:366:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(dotdir, "/.pcsxr/plugins/"); data/pcsxr-1.9.94/gui/nopic.h:11:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char cFont[10][120]= data/pcsxr-1.9.94/gui/nopic.h:300:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char pixel_data[128 * 96 * 3 + 1]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:65:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char cdbuffer[CD_FRAMESIZE_RAW]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:66:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char subbuffer[SUB_FRAMESIZE]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:80:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff_raw[16][CD_FRAMESIZE_RAW]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:81:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff_compressed[CD_FRAMESIZE_RAW * 16 + 100]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:112:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filepath[256]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:140:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). msf[0] = atoi(token); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:148:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). msf[1] = atoi(token); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:156:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). msf[2] = atoi(token); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:425:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tocname[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:427:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linebuf[256], tmp[256], name[256]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:429:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time[20], time2[20]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:439:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(tocname + strlen(tocname) - 4, ".toc"); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:445:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fi = fopen(tocname, "r")) == NULL) { data/pcsxr-1.9.94/libpcsxcore/cdriso.c:447:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(tocname + strlen(tocname) - 4, ".cue"); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:448:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fi = fopen(tocname, "r")) == NULL) { data/pcsxr-1.9.94/libpcsxcore/cdriso.c:454:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fi = fopen(tocname, "r")) == NULL) { data/pcsxr-1.9.94/libpcsxcore/cdriso.c:562:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cuename[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:563:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filepath[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:567:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time[20]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:569:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linebuf[256], tmpb[256], dummy[256]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:580:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cuename + strlen(cuename) - 4, ".cue"); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:586:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fi = fopen(cuename, "r")) == NULL) { data/pcsxr-1.9.94/libpcsxcore/cdriso.c:705:31: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ti[numtracks + 1].handle = fopen(tmpb, "rb"); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:716:32: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ti[numtracks + 1].handle = fopen(filepath, "rb"); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:740:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). cdHandle = fopen(filepath, "rb"); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:753:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ccdname[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:755:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linebuf[256]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:764:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ccdname + strlen(ccdname) - 4, ".ccd"); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:770:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fi = fopen(ccdname, "r")) == NULL) { data/pcsxr-1.9.94/libpcsxcore/cdriso.c:812:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mdsname[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:823:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(mdsname + strlen(mdsname) - 4, ".mds"); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:829:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fi = fopen(mdsname, "rb")) == NULL) { data/pcsxr-1.9.94/libpcsxcore/cdriso.c:925:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char index0[3]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:927:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char index1[3]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:934:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char psar_sig[11]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1091:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char magic[4]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1097:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char rsv_06[2]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1168:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char subname[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1174:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(subname + strlen(subname) - 4, ".sub"); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1180:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). subHandle = fopen(subname, "rb"); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1189:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbiname[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1194:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(sbiname + strlen(sbiname) - 4, ".sbi"); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1317:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, compr_img->buff_raw[compr_img->sector_in_blk], data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1478:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, sector_buffer, CD_FRAMESIZE_RAW); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1589:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). cdHandle = fopen(GetIsoFile(), "rb"); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1665:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ti[1].handle = fopen(GetIsoFile(), "rb"); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1761:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char time[3]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1784:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char subQData[12]; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1795:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&subbuffer[12], subQData, 12); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1878:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char msf[3] = {m, s, f}; data/pcsxr-1.9.94/libpcsxcore/cdrom.c:63:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *CmdName[0x100]= { data/pcsxr-1.9.94/libpcsxcore/cdrom.c:382:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char start[3], next[3]; data/pcsxr-1.9.94/libpcsxcore/cdrom.c:430:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char tmp[3]; data/pcsxr-1.9.94/libpcsxcore/cdrom.c:446:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cdr.Prev, tmp, 3); data/pcsxr-1.9.94/libpcsxcore/cdrom.c:457:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cdr.subq.Relative, subq->TrackRelativeAddress, 3); data/pcsxr-1.9.94/libpcsxcore/cdrom.c:458:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cdr.subq.Absolute, subq->AbsoluteAddress, 3); data/pcsxr-1.9.94/libpcsxcore/cdrom.c:562:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cdr.SetSectorPlay, cdr.SetSector, 4); data/pcsxr-1.9.94/libpcsxcore/cdrom.c:664:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cdr.SetSectorPlay, cdr.SetSector, 4); data/pcsxr-1.9.94/libpcsxcore/cdrom.c:847:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cdr.Result, cdr.Transfer, 8); data/pcsxr-1.9.94/libpcsxcore/cdrom.c:852:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cdr.Result, &cdr.subq, 8); data/pcsxr-1.9.94/libpcsxcore/cdrom.c:923:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cdr.Result, Test20, 4); data/pcsxr-1.9.94/libpcsxcore/cdrom.c:927:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cdr.Result, Test22, 4); data/pcsxr-1.9.94/libpcsxcore/cdrom.c:931:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cdr.Result, Test23, 4); data/pcsxr-1.9.94/libpcsxcore/cdrom.c:994:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cdr.SetSectorPlay, cdr.SetSector, 4); data/pcsxr-1.9.94/libpcsxcore/cdrom.c:1016:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cdr.Transfer, buf, 8); data/pcsxr-1.9.94/libpcsxcore/cdrom.c:1181:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cdr.Transfer, buf, DATA_SIZE); data/pcsxr-1.9.94/libpcsxcore/cdrom.c:1336:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cdr.SetSector, set_loc, 3); data/pcsxr-1.9.94/libpcsxcore/cdrom.c:1436:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&cdr.AttenuatorLeftToLeft, &cdr.AttenuatorLeftToLeftT, 4); data/pcsxr-1.9.94/libpcsxcore/cdrom.c:1598:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpp, cdr.Prev, 3); data/pcsxr-1.9.94/libpcsxcore/cdrom.h:55:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char Transfer[CD_FRAMESIZE_RAW]; data/pcsxr-1.9.94/libpcsxcore/cdrom.h:58:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char Prev[4]; data/pcsxr-1.9.94/libpcsxcore/cdrom.h:59:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char Param[8]; data/pcsxr-1.9.94/libpcsxcore/cdrom.h:60:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char Result[16]; data/pcsxr-1.9.94/libpcsxcore/cdrom.h:72:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ResultTN[6]; data/pcsxr-1.9.94/libpcsxcore/cdrom.h:73:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ResultTD[4]; data/pcsxr-1.9.94/libpcsxcore/cdrom.h:74:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char SetSectorPlay[4]; data/pcsxr-1.9.94/libpcsxcore/cdrom.h:75:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char SetSectorEnd[4]; data/pcsxr-1.9.94/libpcsxcore/cdrom.h:76:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char SetSector[4]; data/pcsxr-1.9.94/libpcsxcore/cdrom.h:108:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char Relative[3]; data/pcsxr-1.9.94/libpcsxcore/cdrom.h:109:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char Absolute[3]; data/pcsxr-1.9.94/libpcsxcore/cheat.c:66:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/pcsxr-1.9.94/libpcsxcore/cheat.c:70:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(filename, "r"); data/pcsxr-1.9.94/libpcsxcore/cheat.c:156:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(filename, "w"); data/pcsxr-1.9.94/libpcsxcore/cheat.c:470:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(prevM, psxM, 0x200000); data/pcsxr-1.9.94/libpcsxcore/coff.h:46:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_name[8]; /* section name */ data/pcsxr-1.9.94/libpcsxcore/debug.c:398:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reply[256]; data/pcsxr-1.9.94/libpcsxcore/debug.c:425:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[257], *arguments, *p, reply[10240], *save, *dump; data/pcsxr-1.9.94/libpcsxcore/debug.c:462:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "202 1.0\r\n"); data/pcsxr-1.9.94/libpcsxcore/debug.c:465:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "203 %i\r\n", paused ? 1 : trace ? 2 : 0); data/pcsxr-1.9.94/libpcsxcore/debug.c:468:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "210 PC=%08X\r\n", psxRegs.pc); data/pcsxr-1.9.94/libpcsxcore/debug.c:484:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "211 %02X(%2.2s)=%08X\r\n", code, disRNameGPR[code], psxRegs.GPR.r[code]); data/pcsxr-1.9.94/libpcsxcore/debug.c:486:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "511 Invalid GPR register: %X\r\n", code); data/pcsxr-1.9.94/libpcsxcore/debug.c:491:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "212 LO=%08X HI=%08X\r\n", psxRegs.GPR.n.lo, psxRegs.GPR.n.hi); data/pcsxr-1.9.94/libpcsxcore/debug.c:507:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "213 %02X(%8.8s)=%08X\r\n", code, disRNameCP0[code], psxRegs.CP0.r[code]); data/pcsxr-1.9.94/libpcsxcore/debug.c:509:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "511 Invalid COP0 register: %X\r\n", code); data/pcsxr-1.9.94/libpcsxcore/debug.c:527:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "214 %02X(%6.6s)=%08X\r\n", code, disRNameCP2C[code], psxRegs.CP2C.r[code]); data/pcsxr-1.9.94/libpcsxcore/debug.c:529:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "511 Invalid COP2C register: %X\r\n", code); data/pcsxr-1.9.94/libpcsxcore/debug.c:547:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "215 %02X(%4.4s)=%08X\r\n", code, disRNameCP2D[code], psxRegs.CP2D.r[code]); data/pcsxr-1.9.94/libpcsxcore/debug.c:549:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "511 Invalid COP2D register: %X\r\n", code); data/pcsxr-1.9.94/libpcsxcore/debug.c:573:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "221 %02X=%08X\r\n", reg, value); data/pcsxr-1.9.94/libpcsxcore/debug.c:575:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "512 Invalid GPR register: %02X\r\n", reg); data/pcsxr-1.9.94/libpcsxcore/debug.c:593:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "222 LO=%08X HI=%08X\r\n", psxRegs.GPR.n.lo, psxRegs.GPR.n.hi); data/pcsxr-1.9.94/libpcsxcore/debug.c:604:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "223 %02X=%08X\r\n", reg, value); data/pcsxr-1.9.94/libpcsxcore/debug.c:606:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "512 Invalid COP0 register: %02X\r\n", reg); data/pcsxr-1.9.94/libpcsxcore/debug.c:617:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "224 %02X=%08X\r\n", reg, value); data/pcsxr-1.9.94/libpcsxcore/debug.c:619:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "512 Invalid COP2C register: %02X\r\n", reg); data/pcsxr-1.9.94/libpcsxcore/debug.c:630:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "225 %02X=%08X\r\n", reg, value); data/pcsxr-1.9.94/libpcsxcore/debug.c:632:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "512 Invalid COP2D register: %02X\r\n", reg); data/pcsxr-1.9.94/libpcsxcore/debug.c:642:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "230 %08X@%08X\r\n", size, address); data/pcsxr-1.9.94/libpcsxcore/debug.c:656:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "240 %08X@%08X\r\n", size, address); data/pcsxr-1.9.94/libpcsxcore/debug.c:895:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). sfile = fopen("flow.idc", "wb"); data/pcsxr-1.9.94/libpcsxcore/debug.c:905:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). sfile = fopen("markcode.idc", "wb"); data/pcsxr-1.9.94/libpcsxcore/debug.c:915:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "270 flow.idc and markcode.idc dumped\r\n"); data/pcsxr-1.9.94/libpcsxcore/debug.c:929:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "530 No breakpoint\r\n"); data/pcsxr-1.9.94/libpcsxcore/debug.c:935:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "530 Invalid breakpoint number: %X\r\n", code); data/pcsxr-1.9.94/libpcsxcore/debug.c:946:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "401 All breakpoints deleted.\r\n"); data/pcsxr-1.9.94/libpcsxcore/debug.c:950:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "401 Breakpoint %X deleted.\r\n", code); data/pcsxr-1.9.94/libpcsxcore/debug.c:952:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "530 Invalid breakpoint number: %X\r\n", code); data/pcsxr-1.9.94/libpcsxcore/debug.c:966:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "410 %X\r\n", code); data/pcsxr-1.9.94/libpcsxcore/debug.c:974:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "532 Invalid address %08X\r\n", address); data/pcsxr-1.9.94/libpcsxcore/debug.c:978:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "420 %X\r\n", code); data/pcsxr-1.9.94/libpcsxcore/debug.c:986:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "532 Invalid address %08X\r\n", address); data/pcsxr-1.9.94/libpcsxcore/debug.c:990:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "421 %X\r\n", code); data/pcsxr-1.9.94/libpcsxcore/debug.c:998:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "532 Invalid address %08X\r\n", address); data/pcsxr-1.9.94/libpcsxcore/debug.c:1002:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "422 %X\r\n", code); data/pcsxr-1.9.94/libpcsxcore/debug.c:1010:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "533 Invalid address %08X\r\n", address); data/pcsxr-1.9.94/libpcsxcore/debug.c:1014:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "430 %X\r\n", code); data/pcsxr-1.9.94/libpcsxcore/debug.c:1022:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "533 Invalid address %08X\r\n", address); data/pcsxr-1.9.94/libpcsxcore/debug.c:1026:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "431 %X\r\n", code); data/pcsxr-1.9.94/libpcsxcore/debug.c:1034:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "533 Invalid address %08X\r\n", address); data/pcsxr-1.9.94/libpcsxcore/debug.c:1038:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "432 %X\r\n", code); data/pcsxr-1.9.94/libpcsxcore/debug.c:1042:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "490 Paused\r\n"); data/pcsxr-1.9.94/libpcsxcore/debug.c:1046:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "491 Resumed\r\n"); data/pcsxr-1.9.94/libpcsxcore/debug.c:1057:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "495 Tracing\r\n"); data/pcsxr-1.9.94/libpcsxcore/debug.c:1073:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "498 Soft resetting\r\n"); data/pcsxr-1.9.94/libpcsxcore/debug.c:1079:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "499 Resetting\r\n"); data/pcsxr-1.9.94/libpcsxcore/debug.c:1099:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reply[512]; data/pcsxr-1.9.94/libpcsxcore/debug.c:1105:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "030 %X@%08X\r\n", bp->number, psxRegs.pc); data/pcsxr-1.9.94/libpcsxcore/debug.c:1113:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "010 %08X@%08X\r\n", address, psxRegs.pc); data/pcsxr-1.9.94/libpcsxcore/debug.c:1120:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "011 %08X@%08X\r\n", address, psxRegs.pc); data/pcsxr-1.9.94/libpcsxcore/debug.c:1127:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "012 %08X@%08X\r\n", address, psxRegs.pc); data/pcsxr-1.9.94/libpcsxcore/debug.c:1134:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "013 %08X@%08X\r\n", address, psxRegs.pc); data/pcsxr-1.9.94/libpcsxcore/debug.c:1141:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "014 %08X@%08X\r\n", address, psxRegs.pc); data/pcsxr-1.9.94/libpcsxcore/debug.c:1148:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "015 %08X@%08X\r\n", address, psxRegs.pc); data/pcsxr-1.9.94/libpcsxcore/debug.c:1155:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(reply, "016 %08X@%08X\r\n", address, psxRegs.pc); data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:26:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ostr[256]; data/pcsxr-1.9.94/libpcsxcore/disr3000a.c:62:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (ostr, "%8.8x %8.8x:", pc, code); \ data/pcsxr-1.9.94/libpcsxcore/ix86/iR3000A.c:248:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iRegsS, iRegs, sizeof(iRegs)); data/pcsxr-1.9.94/libpcsxcore/ix86/iR3000A.c:359:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen("dump1", "w"); data/pcsxr-1.9.94/libpcsxcore/ix86/iR3000A.c:415:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psxRecLUT + 0x8000, psxRecLUT, 0x80 * 4); data/pcsxr-1.9.94/libpcsxcore/ix86/iR3000A.c:416:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psxRecLUT + 0xa000, psxRecLUT, 0x80 * 4); data/pcsxr-1.9.94/libpcsxcore/ix86_64/iR3000A-64.c:298:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iRegsS, iRegs, sizeof(iRegs)); data/pcsxr-1.9.94/libpcsxcore/ix86_64/iR3000A-64.c:417:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen("dump1", "w"); data/pcsxr-1.9.94/libpcsxcore/ix86_64/iR3000A-64.c:480:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psxRecLUT + 0x8000, psxRecLUT, 0x80 * sizeof(uptr)); data/pcsxr-1.9.94/libpcsxcore/ix86_64/iR3000A-64.c:481:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psxRecLUT + 0xa000, psxRecLUT, 0x80 * sizeof(uptr)); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:259:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Type, "Standard OEM"); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:262:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Type, "Overdrive"); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:265:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Type, "Dual"); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:268:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Type, "Reserved"); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:271:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Type, "Unknown"); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:281:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "Intel P6 family (Not PIV and Higher then PPro" ); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:289:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "Intel 486" ); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:296:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "Intel Pentium (MMX)"); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:299:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "Intel Pentium" ); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:307:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "Intel Pentium Pro" ); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:313:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "Intel Pentium II" ); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:320:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "Intel Pentium III" ); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:323:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "Intel Core 2 Duo" ); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:327:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "Intel Pentium Pro (Unknown)" ); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:335:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "Willamette Intel Pentium IV" ); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:338:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "Northwood Intel Pentium IV" ); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:342:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "Intel Pentium IV (Unknown)" ); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:347:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "Unknown Intel CPU" ); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:362:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cpuinfo.x86Fam,"AMD Athlon(tm) 64 Processor"); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:365:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(AMDspeedString," %d",AMDspeed); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:366:6: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(AMDspeedString,"00+"); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:370:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cpuinfo.x86Fam,"AMD Opteron(tm) Processor"); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:373:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "AMD Athlon X2 Processor" ); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:376:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(AMDspeedString," %d",AMDspeed); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:377:6: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(AMDspeedString,"00+"); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:381:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "AMD Opteron(tm) Dual Core Processor" ); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:384:8: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cpuinfo.x86Fam,"Unknown AMD 64 proccesor"); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:390:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cpuinfo.x86Fam,"Unsupported yet AMD64 cpu"); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:395:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "AMD K7+ Processor" ); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:407:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "AMD 5x86 Processor" ); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:414:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "AMD 486 Processor" ); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:419:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "AMD Unknown Processor" ); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:431:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "AMD K5 Processor" ); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:439:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "AMD K6 Series Processor" ); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:443:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "AMD Unknown Processor" ); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:447:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "AMD Athlon XP Processor" ); data/pcsxr-1.9.94/libpcsxcore/ix86_64/ix86_cpudetect.c:450:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( cpuinfo.x86Fam, "Unknown AMD CPU" ); data/pcsxr-1.9.94/libpcsxcore/mdec.c:574:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(image, mdec.block_buffer_pos, n); data/pcsxr-1.9.94/libpcsxcore/mdec.c:590:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(image, mdec.block_buffer, size); data/pcsxr-1.9.94/libpcsxcore/mdec.c:603:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(image, mdec.block_buffer_pos, n); data/pcsxr-1.9.94/libpcsxcore/mdec.c:619:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(image, mdec.block_buffer, size); data/pcsxr-1.9.94/libpcsxcore/misc.c:29:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char CdromId[10] = ""; data/pcsxr-1.9.94/libpcsxcore/misc.c:30:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char CdromLabel[33] = ""; data/pcsxr-1.9.94/libpcsxcore/misc.c:41:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char length [ISODCL (1, 1)]; /* 711 */ data/pcsxr-1.9.94/libpcsxcore/misc.c:42:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ext_attr_length [ISODCL (2, 2)]; /* 711 */ data/pcsxr-1.9.94/libpcsxcore/misc.c:43:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char extent [ISODCL (3, 10)]; /* 733 */ data/pcsxr-1.9.94/libpcsxcore/misc.c:44:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char size [ISODCL (11, 18)]; /* 733 */ data/pcsxr-1.9.94/libpcsxcore/misc.c:45:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char date [ISODCL (19, 25)]; /* 7 by 711 */ data/pcsxr-1.9.94/libpcsxcore/misc.c:46:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char flags [ISODCL (26, 26)]; data/pcsxr-1.9.94/libpcsxcore/misc.c:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file_unit_size [ISODCL (27, 27)]; /* 711 */ data/pcsxr-1.9.94/libpcsxcore/misc.c:48:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char interleave [ISODCL (28, 28)]; /* 711 */ data/pcsxr-1.9.94/libpcsxcore/misc.c:49:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char volume_sequence_number [ISODCL (29, 32)]; /* 723 */ data/pcsxr-1.9.94/libpcsxcore/misc.c:50:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char name_len [ISODCL (33, 33)]; /* 711 */ data/pcsxr-1.9.94/libpcsxcore/misc.c:51:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name [1]; data/pcsxr-1.9.94/libpcsxcore/misc.c:98:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_dir, buf + 12, 2048); \ data/pcsxr-1.9.94/libpcsxcore/misc.c:102:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_dir + 2048, buf + 12, 2048); data/pcsxr-1.9.94/libpcsxcore/misc.c:106:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ddir[4096]; data/pcsxr-1.9.94/libpcsxcore/misc.c:200:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&tmpHead, buf + 12, sizeof(EXE_HEADER)); data/pcsxr-1.9.94/libpcsxcore/misc.c:217:20: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (ptr != NULL) memcpy(ptr, buf+12, 2048); data/pcsxr-1.9.94/libpcsxcore/misc.c:249:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(head, buf + 12, sizeof(EXE_HEADER)); data/pcsxr-1.9.94/libpcsxcore/misc.c:261:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)PSXM(addr), buf + 12, 2048); data/pcsxr-1.9.94/libpcsxcore/misc.c:272:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char time[4], *buf; data/pcsxr-1.9.94/libpcsxcore/misc.c:273:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char mdir[4096]; data/pcsxr-1.9.94/libpcsxcore/misc.c:274:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char exename[256]; data/pcsxr-1.9.94/libpcsxcore/misc.c:321:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(exename, "PSX.EXE;1"); data/pcsxr-1.9.94/libpcsxcore/misc.c:322:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(CdromId, "SLUS99999"); data/pcsxr-1.9.94/libpcsxcore/misc.c:386:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/misc.c:391:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(buf, "rb"); data/pcsxr-1.9.94/libpcsxcore/misc.c:414:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). tmpFile = fopen(ExePath, "rb"); data/pcsxr-1.9.94/libpcsxcore/misc.c:503:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char PcsxrHeader[32] = "STv4 PCSXR v" PACKAGE_VERSION; data/pcsxr-1.9.94/libpcsxcore/misc.c:572:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[32]; data/pcsxr-1.9.94/libpcsxcore/misc.c:625:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[32]; data/pcsxr-1.9.94/libpcsxcore/misc.h:36:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char id[8]; data/pcsxr-1.9.94/libpcsxcore/misc.h:56:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char CdromId[10]; data/pcsxr-1.9.94/libpcsxcore/misc.h:57:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char CdromLabel[33]; data/pcsxr-1.9.94/libpcsxcore/plugins.c:27:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char IsoFile[MAXPATHLEN] = ""; data/pcsxr-1.9.94/libpcsxcore/plugins.c:240:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). LoadGpuSym1(open, "GPUopen"); data/pcsxr-1.9.94/libpcsxcore/plugins.c:316:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). LoadCdrSym1(open, "CDRopen"); data/pcsxr-1.9.94/libpcsxcore/plugins.c:365:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). LoadSpuSym1(open, "SPUopen"); data/pcsxr-1.9.94/libpcsxcore/plugins.c:388:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char buf[256]; data/pcsxr-1.9.94/libpcsxcore/plugins.c:389:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char stdpar[10] = { 0x00, 0x41, 0x5a, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }; data/pcsxr-1.9.94/libpcsxcore/plugins.c:390:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char mousepar[8] = { 0x00, 0x12, 0x5a, 0xff, 0xff, 0xff, 0xff }; data/pcsxr-1.9.94/libpcsxcore/plugins.c:391:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char analogpar[9] = { 0x00, 0xff, 0x5a, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }; data/pcsxr-1.9.94/libpcsxcore/plugins.c:407:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, mousepar, 7); data/pcsxr-1.9.94/libpcsxcore/plugins.c:419:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, analogpar, 9); data/pcsxr-1.9.94/libpcsxcore/plugins.c:431:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, analogpar, 9); data/pcsxr-1.9.94/libpcsxcore/plugins.c:443:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, analogpar, 9); data/pcsxr-1.9.94/libpcsxcore/plugins.c:451:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, stdpar, 5); data/pcsxr-1.9.94/libpcsxcore/plugins.c:505:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). LoadPad1Sym1(open, "PADopen"); data/pcsxr-1.9.94/libpcsxcore/plugins.c:564:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). LoadPad2Sym1(open, "PADopen"); data/pcsxr-1.9.94/libpcsxcore/plugins.c:610:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). LoadNetSym1(open, "NETopen"); data/pcsxr-1.9.94/libpcsxcore/plugins.c:689:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). LoadSio1Sym0(open, "SIO1open"); data/pcsxr-1.9.94/libpcsxcore/plugins.c:733:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Plugin[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/plugins.h:88:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char psxVRam[1024*512*2]; data/pcsxr-1.9.94/libpcsxcore/plugins.h:148:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char Time[3]; data/pcsxr-1.9.94/libpcsxcore/plugins.h:153:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char res0[12]; data/pcsxr-1.9.94/libpcsxcore/plugins.h:157:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char TrackRelativeAddress[3]; data/pcsxr-1.9.94/libpcsxcore/plugins.h:159:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char AbsoluteAddress[3]; data/pcsxr-1.9.94/libpcsxcore/plugins.h:160:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char CRC[2]; data/pcsxr-1.9.94/libpcsxcore/plugins.h:161:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char res1[72]; data/pcsxr-1.9.94/libpcsxcore/plugins.h:204:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char PluginName[8]; data/pcsxr-1.9.94/libpcsxcore/plugins.h:207:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char SPUPorts[0x200]; data/pcsxr-1.9.94/libpcsxcore/plugins.h:208:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char SPURam[0x80000]; data/pcsxr-1.9.94/libpcsxcore/plugins.h:302:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char EmuName[32]; data/pcsxr-1.9.94/libpcsxcore/plugins.h:303:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char CdromID[9]; // ie. 'SCPH12345', no \0 trailing character data/pcsxr-1.9.94/libpcsxcore/plugins.h:304:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char CdromLabel[11]; data/pcsxr-1.9.94/libpcsxcore/plugins.h:309:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char GPUpath[256]; // paths must be absolute data/pcsxr-1.9.94/libpcsxcore/plugins.h:310:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char SPUpath[256]; data/pcsxr-1.9.94/libpcsxcore/plugins.h:311:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char CDRpath[256]; data/pcsxr-1.9.94/libpcsxcore/plugins.h:312:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char MCD1path[256]; data/pcsxr-1.9.94/libpcsxcore/plugins.h:313:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char MCD2path[256]; data/pcsxr-1.9.94/libpcsxcore/plugins.h:314:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char BIOSpath[256]; // 'HLE' for internal bios data/pcsxr-1.9.94/libpcsxcore/plugins.h:315:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Unused[1024]; data/pcsxr-1.9.94/libpcsxcore/ppc/pR3000A.c:906:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iRegsS, iRegs, sizeof(iRegs)); data/pcsxr-1.9.94/libpcsxcore/ppc/pR3000A.c:907:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(HWRegistersS, HWRegisters, sizeof(HWRegisters)); data/pcsxr-1.9.94/libpcsxcore/ppc/pR3000A.c:1090:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psxRecLUT + 0x8000, psxRecLUT, 0x80 * 4); data/pcsxr-1.9.94/libpcsxcore/ppc/pR3000A.c:1091:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psxRecLUT + 0xa000, psxRecLUT, 0x80 * 4); data/pcsxr-1.9.94/libpcsxcore/ppc/pR3000A.c:3526:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf((char *)ppcPtr, "PC=%08x", pcold); data/pcsxr-1.9.94/libpcsxcore/ppf.c:128:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pB + pos, (unsigned char *)(p + 1) + start, anz); data/pcsxr-1.9.94/libpcsxcore/ppf.c:141:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ppfHead + 1, ppfmem, anz); data/pcsxr-1.9.94/libpcsxcore/ppf.c:172:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(padd + 1, ppfmem, anz); data/pcsxr-1.9.94/libpcsxcore/ppf.c:183:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[12]; data/pcsxr-1.9.94/libpcsxcore/ppf.c:186:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ppfmem[512]; data/pcsxr-1.9.94/libpcsxcore/ppf.c:187:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szPPF[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/ppf.c:212:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ppffile = fopen(szPPF, "rb"); data/pcsxr-1.9.94/libpcsxcore/ppf.c:342:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[16], sbifile[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/ppf.c:369:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). sbihandle = fopen(filename, "rb"); data/pcsxr-1.9.94/libpcsxcore/psemu_plugin_defs.h:61:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char reserved[100]; data/pcsxr-1.9.94/libpcsxcore/psemu_plugin_defs.h:209:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char reserved[91]; data/pcsxr-1.9.94/libpcsxcore/psxbios.c:27:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *biosA0n[256] = { data/pcsxr-1.9.94/libpcsxcore/psxbios.c:88:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *biosB0n[256] = { data/pcsxr-1.9.94/libpcsxcore/psxbios.c:121:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *biosC0n[256] = { data/pcsxr-1.9.94/libpcsxcore/psxbios.c:221:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[20]; data/pcsxr-1.9.94/libpcsxcore/psxbios.c:226:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char system[4]; data/pcsxr-1.9.94/libpcsxcore/psxbios.c:230:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/pcsxr-1.9.94/libpcsxcore/psxbios.c:295:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(regs, psxRegs.GPR.r, 32*4); data/pcsxr-1.9.94/libpcsxcore/psxbios.c:302:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psxRegs.GPR.r, regs, 32*4); data/pcsxr-1.9.94/libpcsxcore/psxbios.c:946:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[1024]; data/pcsxr-1.9.94/libpcsxcore/psxbios.c:947:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp2[1024]; data/pcsxr-1.9.94/libpcsxcore/psxbios.c:952:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(save, (char*)PSXM(sp), 4 * 4); data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1006:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char*)PSXM(sp), save, 4 * 4); data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1029:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(Ra1, ((char*)&eheader)+16, sizeof(EXEC)); data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1531:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(Thread[CurThread].reg, psxRegs.GPR.r, 32*4); data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1534:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psxRegs.GPR.r, Thread[th].reg, 32*4); data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1732:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(Ra1, ptr, a2); \ data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1765:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, Ra1, a2); \ data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1817:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char psxstrbuf[PSXSTRBUFMAX+1]; data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1849:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ffile[64], *pfile; data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1946:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr+0xa, Ra1+5, namelen); \ data/pcsxr-1.9.94/libpcsxcore/psxbios.c:2061:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(Mcd1Data + a1 * 128, Ra2, 128); data/pcsxr-1.9.94/libpcsxcore/psxbios.c:2064:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(Mcd2Data + a1 * 128, Ra2, 128); data/pcsxr-1.9.94/libpcsxcore/psxbios.c:2085:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(Ra2, Mcd1Data + a1 * 128, 128); data/pcsxr-1.9.94/libpcsxcore/psxbios.c:2087:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(Ra2, Mcd2Data + a1 * 128, 128); data/pcsxr-1.9.94/libpcsxcore/psxbios.c:2603:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy((char *)&psxM[0x248], "bu"); data/pcsxr-1.9.94/libpcsxcore/psxbios.c:2830:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (Mode == 1) memcpy(&psxR[base], ptr, size); \ data/pcsxr-1.9.94/libpcsxcore/psxbios.c:2831:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (Mode == 0) memcpy(ptr, &psxR[base], size); \ data/pcsxr-1.9.94/libpcsxcore/psxbios.h:33:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char *biosA0n[256]; data/pcsxr-1.9.94/libpcsxcore/psxbios.h:34:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char *biosB0n[256]; data/pcsxr-1.9.94/libpcsxcore/psxbios.h:35:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char *biosC0n[256]; data/pcsxr-1.9.94/libpcsxcore/psxcommon.c:65:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[1024]; data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:126:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Gpu[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:127:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Spu[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:128:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Cdr[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:129:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Pad1[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:130:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Pad2[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:131:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Net[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:132:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Sio1[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:133:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Mcd1[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:134:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Mcd2[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:135:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Bios[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:136:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char BiosDir[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:137:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char PluginsDir[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:138:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char PatchesDir[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:139:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char IsoImgDir[MAXPATHLEN]; data/pcsxr-1.9.94/libpcsxcore/psxcommon.h:160:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Lang[256]; data/pcsxr-1.9.94/libpcsxcore/psxcounters.c:98:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ 4096 ]; data/pcsxr-1.9.94/libpcsxcore/psxmem.c:85:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psxMemRLUT + 0x8000, psxMemRLUT, 0x80 * sizeof(void *)); data/pcsxr-1.9.94/libpcsxcore/psxmem.c:86:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psxMemRLUT + 0xa000, psxMemRLUT, 0x80 * sizeof(void *)); data/pcsxr-1.9.94/libpcsxcore/psxmem.c:93:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psxMemRLUT + 0x9fc0, psxMemRLUT + 0x1fc0, 0x08 * sizeof(void *)); data/pcsxr-1.9.94/libpcsxcore/psxmem.c:94:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psxMemRLUT + 0xbfc0, psxMemRLUT + 0x1fc0, 0x08 * sizeof(void *)); data/pcsxr-1.9.94/libpcsxcore/psxmem.c:99:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psxMemWLUT + 0x8000, psxMemWLUT, 0x80 * sizeof(void *)); data/pcsxr-1.9.94/libpcsxcore/psxmem.c:100:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psxMemWLUT + 0xa000, psxMemWLUT, 0x80 * sizeof(void *)); data/pcsxr-1.9.94/libpcsxcore/psxmem.c:110:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bios[1024]; data/pcsxr-1.9.94/libpcsxcore/psxmem.c:118:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(bios, "rb"); data/pcsxr-1.9.94/libpcsxcore/psxmem.c:157:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. p = (char *)(psxMemRLUT[t]); data/pcsxr-1.9.94/libpcsxcore/psxmem.c:186:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. p = (char *)(psxMemRLUT[t]); data/pcsxr-1.9.94/libpcsxcore/psxmem.c:215:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. p = (char *)(psxMemRLUT[t]); data/pcsxr-1.9.94/libpcsxcore/psxmem.c:244:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. p = (char *)(psxMemWLUT[t]); data/pcsxr-1.9.94/libpcsxcore/psxmem.c:275:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. p = (char *)(psxMemWLUT[t]); data/pcsxr-1.9.94/libpcsxcore/psxmem.c:307:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. p = (char *)(psxMemWLUT[t]); data/pcsxr-1.9.94/libpcsxcore/psxmem.c:343:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psxMemWLUT + 0x8000, psxMemWLUT, 0x80 * sizeof(void *)); data/pcsxr-1.9.94/libpcsxcore/psxmem.c:344:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psxMemWLUT + 0xa000, psxMemWLUT, 0x80 * sizeof(void *)); data/pcsxr-1.9.94/libpcsxcore/psxmem.c:368:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. p = (char *)(psxMemWLUT[t]); data/pcsxr-1.9.94/libpcsxcore/sio.c:57:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char buf[ BUFFER_SIZE ]; data/pcsxr-1.9.94/libpcsxcore/sio.c:59:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char cardh[4] = { 0x00, 0x00, 0x5a, 0x5d }; data/pcsxr-1.9.94/libpcsxcore/sio.c:75:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Mcd1Data[MCD_SIZE], Mcd2Data[MCD_SIZE]; data/pcsxr-1.9.94/libpcsxcore/sio.c:81:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char DongleData[ DONGLE_SIZE ]; data/pcsxr-1.9.94/libpcsxcore/sio.c:277:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&buf[4], Mcd1Data + (adrL | (adrH << 8)) * 128, 128); data/pcsxr-1.9.94/libpcsxcore/sio.c:280:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&buf[4], Mcd2Data + (adrL | (adrH << 8)) * 128, 128); data/pcsxr-1.9.94/libpcsxcore/sio.c:498:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( DongleData + DongleBank * 0x1000, buf+1, 0x1000 ); data/pcsxr-1.9.94/libpcsxcore/sio.c:707:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, buf + 128, 32); data/pcsxr-1.9.94/libpcsxcore/sio.c:722:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, cardh, 4); data/pcsxr-1.9.94/libpcsxcore/sio.c:787:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(Mcd1Data + (adrL | (adrH << 8)) * 128, &buf[1], 128); data/pcsxr-1.9.94/libpcsxcore/sio.c:791:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(Mcd2Data + (adrL | (adrH << 8)) * 128, &buf[1], 128); data/pcsxr-1.9.94/libpcsxcore/sio.c:875:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "memcards/card%d.mcd", mcd); data/pcsxr-1.9.94/libpcsxcore/sio.c:878:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(str, "rb"); data/pcsxr-1.9.94/libpcsxcore/sio.c:882:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(str, "rb"); data/pcsxr-1.9.94/libpcsxcore/sio.c:920:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(mcd, "r+b"); data/pcsxr-1.9.94/libpcsxcore/sio.c:941:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(mcd, "wb"); data/pcsxr-1.9.94/libpcsxcore/sio.c:957:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(mcd, "wb"); data/pcsxr-1.9.94/libpcsxcore/sio.c:1113:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(mcd, "wb"); data/pcsxr-1.9.94/libpcsxcore/sio.c:1118:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(mcd, "r+"); data/pcsxr-1.9.94/libpcsxcore/sio.c:1147:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(mcd, "wb"); data/pcsxr-1.9.94/libpcsxcore/sio.c:1152:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(mcd, "r+"); data/pcsxr-1.9.94/libpcsxcore/sio.c:1169:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(mcd, "wb"); data/pcsxr-1.9.94/libpcsxcore/sio.c:1287:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(str, "r+b"); data/pcsxr-1.9.94/libpcsxcore/sio.c:1323:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(str, "wb"); data/pcsxr-1.9.94/libpcsxcore/sio.h:36:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char Mcd1Data[MCD_SIZE], Mcd2Data[MCD_SIZE]; data/pcsxr-1.9.94/libpcsxcore/sio.h:62:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Title[48 + 1]; // Title in ASCII data/pcsxr-1.9.94/libpcsxcore/sio.h:63:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sTitle[48 * 2 + 1]; // Title in Shift-JIS data/pcsxr-1.9.94/libpcsxcore/sio.h:64:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ID[12 + 1]; data/pcsxr-1.9.94/libpcsxcore/sio.h:65:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Name[16 + 1]; data/pcsxr-1.9.94/libpcsxcore/socket.c:37:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char tbuf[513]; data/pcsxr-1.9.94/libpcsxcore/socket.c:99:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hello[256]; data/pcsxr-1.9.94/libpcsxcore/socket.c:200:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer, tbuf, mlen); data/pcsxr-1.9.94/macosx/Plugin.c:104:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAXPATHLEN]; data/pcsxr-1.9.94/macosx/plugins/Bladesio1/macsrc/cfg.c:35:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(settings.ip, "127.0.0.1"); data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:35:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cdDevice[4096] = ""; data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:39:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[CD_FRAMESIZE_RAW]; data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:42:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(dev, O_RDONLY, 0); data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:91:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char psz_buf[0x32]; data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:104:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(psz_buf, "/dev/r"); data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:140:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). cdHandle = open(cdDevice, O_RDONLY, 0); data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:185:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[CD_FRAMESIZE_RAW]; data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:203:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cr->buf, buf, CD_FRAMESIZE_RAW); data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:229:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). cdHandle = open(cdDevice, O_RDONLY, 0); data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cfg.c:28:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char CdromDev[256]; data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:144:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[64]; data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:155:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "0x%.2X", key); data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:159:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *hatname[16] = {"Centered", "Up", "Right", "Rightup", data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:167:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, _("Joystick: Button %d"), g.cfg.PadDef[joynum].KeyDef[key].J.Button); data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:171:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, _("Joystick: Axis %d%c"), abs(g.cfg.PadDef[joynum].KeyDef[key].J.Axis) - 1, data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:188:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buf, " / "); data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:190:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyboardBuf[64] = {0}; data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:201:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, _("Joystick: Button %d"), g.cfg.PadDef[joynum].AnalogDef[analognum][dir].J.Button); data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:205:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, _("Joystick: Axis %d%c"), abs(g.cfg.PadDef[joynum].AnalogDef[analognum][dir].J.Axis) - 1, data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:222:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buf, " / "); data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:224:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyboardBuf[64] = {0}; data/pcsxr-1.9.94/macosx/plugins/DFNet/macsrc/cfg.c:33:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(CFG_FILENAME, "w"); data/pcsxr-1.9.94/plugins/bladesio1/cfg.c:41:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). file = fopen(configName, "rb"); data/pcsxr-1.9.94/plugins/bladesio1/cfg.c:48:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(settings.ip, "127.0.0.1"); data/pcsxr-1.9.94/plugins/bladesio1/cfg.c:56:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). file = fopen(configName, "wb"); data/pcsxr-1.9.94/plugins/bladesio1/gui.c:55:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(IPAddress, "127.0.0.1"); data/pcsxr-1.9.94/plugins/bladesio1/gui.c:78:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[256]; data/pcsxr-1.9.94/plugins/bladesio1/gui.c:85:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(IPAddress, "127.0.0.1"); data/pcsxr-1.9.94/plugins/bladesio1/gui.c:93:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[512]; data/pcsxr-1.9.94/plugins/bladesio1/gui.c:110:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[256]; data/pcsxr-1.9.94/plugins/bladesio1/sio1.c:550:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cfg[256]; data/pcsxr-1.9.94/plugins/bladesio1/sio1.c:553:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cfg, "./cfgBladeSio1"); data/pcsxr-1.9.94/plugins/bladesio1/sio1.c:567:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cfg, "./cfg/cfgBladeSio1"); data/pcsxr-1.9.94/plugins/bladesio1/sio1.h:74:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[32]; data/pcsxr-1.9.94/plugins/dfcdrom/cdr-libcdio.c:40:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/pcsxr-1.9.94/plugins/dfcdrom/cdr-libcdio.c:138:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char msf[3]; data/pcsxr-1.9.94/plugins/dfcdrom/cdr-libcdio.c:233:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char buf[CD_FRAMESIZE_RAW + 96]; data/pcsxr-1.9.94/plugins/dfcdrom/cdr-linux.c:66:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[CD_FRAMESIZE_RAW]; data/pcsxr-1.9.94/plugins/dfcdrom/cdr-linux.c:90:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[CD_FRAMESIZE_RAW + 96]; data/pcsxr-1.9.94/plugins/dfcdrom/cdr-linux.c:116:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). cdHandle = open(dev, O_RDONLY); data/pcsxr-1.9.94/plugins/dfcdrom/cdr-linux.c:180:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char msf[3]; data/pcsxr-1.9.94/plugins/dfcdrom/cdr-linux.c:233:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ptmp[4]; data/pcsxr-1.9.94/plugins/dfcdrom/cdr-linux.c:279:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stat->Time, &sc.cdsc_absaddr.msf, 3); data/pcsxr-1.9.94/plugins/dfcdrom/cdr-linux.c:320:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char buf[CD_FRAMESIZE_RAW + 96]; data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:42:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char lastTime[3]; data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:257:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char curTime[3]; data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:270:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(curTime, &cr.msf, 3); data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:323:15: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (UseSubQ) memcpy(lastTime, time, 3); data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:444:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char msf[3] = {itob(m), itob(s), itob(f)}; data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:452:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer, p - 12, CD_FRAMESIZE_RAW); // copy from the beginning of the sector data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:472:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cfg[256]; data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:475:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cfg, "./cfgDFCdrom"); data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:489:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cfg, "./cfg/cfgDFCdrom"); data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:118:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char CdromDev[256]; data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:161:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char StartingLBA[4]; data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:162:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char TransferBlocks[3]; data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:183:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char Time[3]; // current playing time data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:187:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char res0[12]; data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:191:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char TrackRelativeAddress[3]; data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:193:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char AbsoluteAddress[3]; data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:194:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char CRC[2]; data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:195:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char res1[72]; data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:200:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[CD_FRAMESIZE_RAW]; data/pcsxr-1.9.94/plugins/dfcdrom/cdr.h:204:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char msf[3]; data/pcsxr-1.9.94/plugins/dfcdrom/cdrcfg-0.1df/main.c:41:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(device, O_RDONLY | O_NONBLOCK)) < 0) return 0; data/pcsxr-1.9.94/plugins/dfcdrom/cdrcfg-0.1df/main.c:123:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cdrom_devices[256][256]; data/pcsxr-1.9.94/plugins/dfcdrom/cdrcfg-0.1df/main.c:125:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256], *devname, *nick; data/pcsxr-1.9.94/plugins/dfcdrom/cfg.c:24:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char CdromDev[256]; data/pcsxr-1.9.94/plugins/dfcdrom/cfg.c:35:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256], *devname, *nick; data/pcsxr-1.9.94/plugins/dfcdrom/cfg.c:67:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen("dfcdrom.cfg", "r"); data/pcsxr-1.9.94/plugins/dfcdrom/cfg.c:88:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen("dfcdrom.cfg", "w"); data/pcsxr-1.9.94/plugins/dfcdrom/util.c:39:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char subQData[12]; data/pcsxr-1.9.94/plugins/dfcdrom/util.c:50:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&subbuffer[12], subQData, 12); data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:30:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *widgetname_treeview[3] = {"treeview_e", "treeview1", "treeview2"}; data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:31:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *widgetname_change[3] = {"btnchange_e", "btnchange1", "btnchange2"}; data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:32:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *widgetname_reset[3] = {"btnreset_e", "btnreset1", "btnreset2"}; data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:33:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *widgetname_combodev[3] = {"combodev_e", "combodev1", "combodev2"}; data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:57:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *EmuKeyText[EMU_TOTAL] = { data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:66:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *DPadText[DKEY_TOTAL] = { data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:120:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *hatname[16] = {_("Centered"), _("Up"), _("Right"), _("Rightup"), data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:128:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, _("Joystick: Button %d"), keydef->J.Button); data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:132:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, _("Joystick: Axis %d%c"), abs(keydef->J.Axis) - 1, data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:149:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buf, " / "); data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:152:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buf, _("Keyboard:")); data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:156:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buf, _("(Not Set)")); data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:161:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *hatname[16] = {_("Centered"), _("Up"), _("Right"), _("Rightup"), data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:167:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, _("Joystick: Button %d"), g.cfg.PadDef[joynum].AnalogDef[analognum][dir].J.Button); data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:171:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, _("Joystick: Axis %d%c"), abs(g.cfg.PadDef[joynum].AnalogDef[analognum][dir].J.Axis) - 1, data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:188:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buf, " / "); data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:191:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buf, _("Keyboard:")); data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:195:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buf, _("(Not Set)")); data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:204:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:256:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:367:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buttons[32]; data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:461:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buttons[32]; data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:594:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/pcsxr-1.9.94/plugins/dfinput/cfg.c:132:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/pcsxr-1.9.94/plugins/dfinput/cfg.c:137:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(CONFIG_FILE, "r"); data/pcsxr-1.9.94/plugins/dfinput/cfg.c:146:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). g.cfg.Threaded = atoi(&buf[9]); data/pcsxr-1.9.94/plugins/dfinput/cfg.c:148:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). g.cfg.HideCursor = atoi(&buf[11]); data/pcsxr-1.9.94/plugins/dfinput/cfg.c:150:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). g.cfg.PreventScrSaver = atoi(&buf[16]); data/pcsxr-1.9.94/plugins/dfinput/cfg.c:152:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). current = atoi(&buf[4]) - 1; data/pcsxr-1.9.94/plugins/dfinput/cfg.c:159:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). g.cfg.PadDef[current].DevNum = atoi(&buf[7]); data/pcsxr-1.9.94/plugins/dfinput/cfg.c:161:33: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). g.cfg.PadDef[current].Type = atoi(&buf[5]); data/pcsxr-1.9.94/plugins/dfinput/cfg.c:163:44: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). g.cfg.PadDef[current].VisualVibration = atoi(&buf[16]); data/pcsxr-1.9.94/plugins/dfinput/cfg.c:165:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). g.cfg.E.DevNum = atoi(&buf[5]); data/pcsxr-1.9.94/plugins/dfinput/cfg.c:331:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(CONFIG_FILE, "w"); data/pcsxr-1.9.94/plugins/dfinput/pad.c:262:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dev = open(sdlj, O_RDONLY); data/pcsxr-1.9.94/plugins/dfinput/pad.c:266:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dev = open(sdlj, O_RDWR); data/pcsxr-1.9.94/plugins/dfinput/pad.c:285:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[20]; data/pcsxr-1.9.94/plugins/dfinput/pad.c:287:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "/dev/input/event%d", devno); data/pcsxr-1.9.94/plugins/dfinput/pad.c:288:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dev = open(buf, O_RDONLY); data/pcsxr-1.9.94/plugins/dfinput/pad.c:298:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dev = open(buf, O_RDWR); data/pcsxr-1.9.94/plugins/dfinput/xkb.c:48:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/pcsxr-1.9.94/plugins/dfinput/xkb.c:80:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/pcsxr-1.9.94/plugins/dfnet/cfg.c:19:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(CFG_FILENAME, "w"); data/pcsxr-1.9.94/plugins/dfnet/cfg.c:28:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(CFG_FILENAME, "r"); data/pcsxr-1.9.94/plugins/dfnet/cfg.c:32:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(conf.ipAddress, "127.0.0.1"); data/pcsxr-1.9.94/plugins/dfnet/dfnet.c:234:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&PadSendData[PadCount], pData, Size); data/pcsxr-1.9.94/plugins/dfnet/dfnet.c:250:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pData, &PadSendData[PadCount == 0 ? PadCountMax-1 : PadCount-1], PadSendSize); data/pcsxr-1.9.94/plugins/dfnet/dfnet.h:70:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ipAddress[32]; data/pcsxr-1.9.94/plugins/dfnet/dfnet.h:83:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char PadSize[2]; data/pcsxr-1.9.94/plugins/dfnet/gui.c:21:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[512]; data/pcsxr-1.9.94/plugins/dfnet/gui.c:54:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(IPAddress, "127.0.0.1"); data/pcsxr-1.9.94/plugins/dfnet/gui.c:77:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[256]; data/pcsxr-1.9.94/plugins/dfnet/gui.c:84:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(IPAddress, "127.0.0.1"); data/pcsxr-1.9.94/plugins/dfnet/gui.c:90:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[256]; data/pcsxr-1.9.94/plugins/dfnet/gui.c:100:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/pcsxr-1.9.94/plugins/dfnet/gui.c:122:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%d", conf.PortNum); data/pcsxr-1.9.94/plugins/dfnet/gui.c:138:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). conf.PortNum = atoi(gtk_entry_get_text(GTK_ENTRY(widget))); data/pcsxr-1.9.94/plugins/dfnet/gui.c:195:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[512]; data/pcsxr-1.9.94/plugins/dfnet/unix.c:23:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cfg[512]; data/pcsxr-1.9.94/plugins/dfnet/unix.c:25:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cfg, "cfg/cfgDFNet"); data/pcsxr-1.9.94/plugins/dfnet/unix.c:50:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[32]; data/pcsxr-1.9.94/plugins/dfnet/unix.c:67:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[512]; data/pcsxr-1.9.94/plugins/dfnet/unix.c:68:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[512]; data/pcsxr-1.9.94/plugins/dfsound/cfg.c:37:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[255]; data/pcsxr-1.9.94/plugins/dfsound/cfg.c:39:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(filename,"cfgDFSound"); data/pcsxr-1.9.94/plugins/dfsound/cfg.c:40:5: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). cf=fopen(filename,"rb"); data/pcsxr-1.9.94/plugins/dfsound/cfg.c:67:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. FILE *in;char t[256];int len; data/pcsxr-1.9.94/plugins/dfsound/cfg.c:70:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"dfsound.cfg"); data/pcsxr-1.9.94/plugins/dfsound/cfg.c:71:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in = fopen(t,"rb"); data/pcsxr-1.9.94/plugins/dfsound/cfg.c:74:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"cfg/dfsound.cfg"); data/pcsxr-1.9.94/plugins/dfsound/cfg.c:75:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in = fopen(t,"rb"); data/pcsxr-1.9.94/plugins/dfsound/cfg.c:79:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in = fopen(t,"rb"); data/pcsxr-1.9.94/plugins/dfsound/cfg.c:90:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nVolume");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/dfsound/cfg.c:91:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iVolume=4-atoi(p+len); data/pcsxr-1.9.94/plugins/dfsound/cfg.c:95:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nXAPitch");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/dfsound/cfg.c:96:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iXAPitch=atoi(p+len); data/pcsxr-1.9.94/plugins/dfsound/cfg.c:100:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nHighCompMode");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/dfsound/cfg.c:101:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iUseTimer=atoi(p+len); data/pcsxr-1.9.94/plugins/dfsound/cfg.c:107:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nSPUIRQWait");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/dfsound/cfg.c:108:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iSPUIRQWait=atoi(p+len); data/pcsxr-1.9.94/plugins/dfsound/cfg.c:112:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nUseReverb");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/dfsound/cfg.c:113:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iUseReverb=atoi(p+len); data/pcsxr-1.9.94/plugins/dfsound/cfg.c:117:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nUseInterpolation");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/dfsound/cfg.c:118:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iUseInterpolation=atoi(p+len); data/pcsxr-1.9.94/plugins/dfsound/cfg.c:122:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nDisStereo");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/dfsound/cfg.c:123:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iDisStereo=atoi(p+len); data/pcsxr-1.9.94/plugins/dfsound/cfg.c:127:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nFreqResponse");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/dfsound/cfg.c:128:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iFreqResponse=atoi(p+len); data/pcsxr-1.9.94/plugins/dfsound/freeze.c:33:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szSPUName[8]; data/pcsxr-1.9.94/plugins/dfsound/freeze.c:36:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char cSPUPort[0x200]; data/pcsxr-1.9.94/plugins/dfsound/freeze.c:37:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char cSPURam[0x80000]; data/pcsxr-1.9.94/plugins/dfsound/freeze.c:78:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(pF->szSPUName,"PBOSS"); data/pcsxr-1.9.94/plugins/dfsound/freeze.c:86:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pF->cSPURam,spuMem,0x80000); // copy common infos data/pcsxr-1.9.94/plugins/dfsound/freeze.c:87:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pF->cSPUPort,regArea,0x200); data/pcsxr-1.9.94/plugins/dfsound/freeze.c:106:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)&pFO->s_chan[i],(void *)&s_chan[i],sizeof(SPUCHAN)); data/pcsxr-1.9.94/plugins/dfsound/freeze.c:132:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(spuMem,pF->cSPURam,0x80000); // get ram data/pcsxr-1.9.94/plugins/dfsound/freeze.c:133:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(regArea,pF->cSPUPort,0x200); data/pcsxr-1.9.94/plugins/dfsound/freeze.c:198:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)&s_chan[i],(void *)&pFO->s_chan[i],sizeof(SPUCHAN)); data/pcsxr-1.9.94/plugins/dfsound/openal.c:153:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[BUFFER_SIZE]; data/pcsxr-1.9.94/plugins/dfsound/oss.c:55:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((oss_audio_fd=open("/dev/dsp",O_WRONLY,0))==-1) data/pcsxr-1.9.94/plugins/dfsound/spu.c:376:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char NoiseWaveAdd [64] = { data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:32:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi(p + len); data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:57:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char t[256]; data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:60:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cfg[255]; data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:110:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in = fopen(cfg, READBINARY); data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:124:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t, "\nVolume"); data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:136:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t, "\nUseInterpolation"); data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:148:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t, "\nXAPitch"); data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:160:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t, "\nHighCompMode"); data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:172:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t, "\nSPUIRQWait"); data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:185:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t, "\nDisStereo"); data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:198:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t, "\nFreqResponse"); data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:211:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t, "\nUseReverb"); data/pcsxr-1.9.94/plugins/dfsound/spucfg-0.1df/main.c:245:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(CONFIG_FILENAME, WRITEBINARY); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:42:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (*p != '\n') var = atoi(p); \ data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:59:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(t1, "%d", var); \ data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:74:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(t1, "%.1f", (double)var); \ data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:86:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. FILE *in;char t[256];int len, size; data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:93:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"dfxvideo.cfg"); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:94:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in = fopen(t,"rb"); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:97:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"cfg/dfxvideo.cfg"); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:98:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in = fopen(t,"rb"); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:108:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in = fopen(t,"rb"); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:170:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cfg[256]; data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:173:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cfg, "./cfgDFXVideo"); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:187:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cfg, "./cfg/cfgDFXVideo"); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:258:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. FILE *out;char t[256];int len, size; data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:259:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * pB, * p; char t1[8]; data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:265:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"dfxvideo.cfg"); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:266:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). out = fopen(t,"rb"); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:269:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"cfg/dfxvideo.cfg"); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:270:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). out = fopen(t,"rb"); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:280:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). out = fopen(t,"rb"); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:323:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). out = fopen(t,"wb"); data/pcsxr-1.9.94/plugins/dfxvideo/draw.c:1873:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char cache_vert_mask[640]; data/pcsxr-1.9.94/plugins/dfxvideo/draw.c:2014:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char cache_vert_mask[640]; data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:113:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szDispBuf[64]; data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:114:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szMenuBuf[36]; data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:115:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szDebugText[512]; data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:256:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szO[2][4]={"off","on "}; data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:257:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szTxt[256]; data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:269:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szTxt,"Resolution/Color:\r\n- %dx%d ",LOWORD(iWinSize),HIWORD(iWinSize)); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:271:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szTxt,"Resolution/Color:\r\n- %dx%d ",iResX,iResY); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:274:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(szTxt,"Window mode\r\n"); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:277:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szTxt,"Window mode - [%d Bit]\r\n",iDesktopCol); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:279:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szTxt,"Fullscreen - [%d Bit]\r\n",iColDepth); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:282:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szTxt,"Stretch mode: %d\r\n",iUseNoStretchBlt); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:284:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szTxt,"Dither mode: %d\r\n\r\n",iUseDither); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:291:15: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(iFastFwd) strcat(pB," (fast forward)"); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:292:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(pB,"\r\n"); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:294:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(szTxt,"- FPS limit: Auto\r\n\r\n"); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:295:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(szTxt,"- FPS limit: %.1f\r\n\r\n",fFrameRate); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:299:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(szTxt,"Misc:\r\n- MaintainAspect: "); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:300:27: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(iMaintainAspect == 0) strcat(szTxt,"disabled"); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:302:27: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(iMaintainAspect == 1) strcat(szTxt,"enabled"); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:303:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(szTxt,"\r\n"); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:315:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szTxt[256]; data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:319:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szTxt,"snap\\pcsxr%04d.txt",iNum); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:324:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((txtfile = fopen(szTxt, "wb")) == NULL) data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:339:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[256]; data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:340:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char header[0x36]; data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:342:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char line[1024 * 3]; data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:344:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char empty[2] = {0,0}; data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:381:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(filename,"snap\\pcsxr%04ld.bmp",snapshotnr); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:386:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). bmpfile = fopen(filename,"rb"); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:395:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((bmpfile = fopen(filename,"wb")) == NULL) data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:609:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szDispBuf,"FPS %06.1f",fps_cur); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:1388:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const unsigned char primTableCX[256] = data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:1750:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char psxVRam[1024*1024*2]; // current VRam image (full 2 MB for ZN) data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:1774:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pF->ulControl,ulStatusControl,256*sizeof(uint32_t)); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:1775:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pF->psxVRam, psxVub, 1024*iGPUHeight*2); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:1783:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ulStatusControl,pF->ulControl,256*sizeof(uint32_t)); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:1784:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psxVub, pF->psxVRam, 1024*iGPUHeight*2); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:1818:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char cFont[10][120]= data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:44:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi(p + len); data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:106:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. FILE *in;char t[256];int len,val; data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:109:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cfg[255]; data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:111:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tempstr[50]; data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:161:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in = fopen(cfg,READBINARY); data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:175:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nResX");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:192:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nNoStretch");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:202:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nDithering");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:212:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nMaintain43");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:222:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nFullScreen");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:232:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nShowFPS");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:242:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nUseFrameLimit");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:251:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nFPSDetection");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:260:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nUseFrameSkip");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:269:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nFrameRate");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:270:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) valf=(float)atoi(p+len) / 10; data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:274:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tempstr,"%.1f",valf); data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:280:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nUseFixes");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:289:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nCfgFixes");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:291:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi(p + len); data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:296:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tempstr, "checkFix%d", i+1); data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:340:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * p, *ps, *pC;char t[32]; data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:342:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(t,"%d",val); data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:363:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(pB," = "); data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:372:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cfg[255]; data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:373:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tempstr[50]; data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:383:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in = fopen(cfg,READBINARY); data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:435:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tempstr, "checkFix%d", i+1); data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:444:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((in=fopen(cfg, WRITEBINARY))!=NULL) data/pcsxr-1.9.94/plugins/dfxvideo/menu.c:108:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(szMenuBuf," FL FS DI GF "); // main menu items data/pcsxr-1.9.94/plugins/dfxvideo/soft.c:206:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char dithertable[16] = data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:39:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *pB, *p, t[256]; data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:42:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in = fopen(pConfigFile, "rb"); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:44:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in = fopen("gpuPeopsMesaGL.cfg", "rb"); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:54:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nResX");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:55:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iResX=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:58:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nResY");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:59:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iResY=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:62:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nKeepRatio");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:63:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) bKeepRatio=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:67:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nForceRatio43");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:68:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) bForceRatio43=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:72:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nScreenSmoothing");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:73:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iBlurBuffer=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:77:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nHiResTextures");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:78:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iHiResTextures=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:83:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nVRamSize");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:84:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iVRamSize=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:88:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nFullScreen");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:89:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) bFullScreen=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:92:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nScanLines");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:93:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iUseScanLines=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:97:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nScanLinesBlend");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:98:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iScanBlend=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:102:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nFrameTextures");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:103:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iFrameTexType=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:107:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nFrameAccess");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:108:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iFrameReadType=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:114:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nTexFilter");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:115:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iFilterType=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:119:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nAdvancedBlend");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:120:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) bAdvancedBlend=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:124:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nDithering");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:125:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) bDrawDither=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:129:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nLineMode");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:130:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) bUseLines=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:134:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nShowFPS");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:135:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iShowFPS=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:139:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nUseFrameLimit");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:140:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) bUseFrameLimit=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:144:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nUseFrameSkip");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:145:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) bUseFrameSkip=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:149:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nFPSDetection");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:150:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iFrameLimit=atoi(p+len)+1; data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:154:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nFrameRate");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:159:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nOffscreenDrawing");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:160:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iOffscreenDrawing=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:164:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nOpaquePass");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:165:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) bOpaquePass=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:169:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nAntiAlias");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:170:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) bUseAntiAlias=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:174:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nTexQuality");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:175:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iTexQuality=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:179:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\n15bitMdec");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:180:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) bUse15bitMdec=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:184:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nMaskDetect");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:185:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iUseMask=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:189:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nFastMdec");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:190:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) bUseFastMdec=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:194:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nCfgFixes");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:195:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) dwCfgFixes=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:197:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nUseFixes");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:198:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) bUseFixes=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:202:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nOGLExtensions");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:203:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iUseExts=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:206:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nGteAccuracy");p=strstr(pB,t);if(p) {p=strstr(p,"=");len=1;} data/pcsxr-1.9.94/plugins/peopsxgl/cfg.c:207:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) bGteAccuracy=atoi(p+len); data/pcsxr-1.9.94/plugins/peopsxgl/externals.h:192:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char col[4]; data/pcsxr-1.9.94/plugins/peopsxgl/externals.h:199:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char c[2]; data/pcsxr-1.9.94/plugins/peopsxgl/externals.h:205:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char c[4]; data/pcsxr-1.9.94/plugins/peopsxgl/externals.h:249:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern unsigned char gl_ux[8]; data/pcsxr-1.9.94/plugins/peopsxgl/externals.h:250:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern unsigned char gl_vy[8]; data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:135:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szDispBuf[64]; data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:222:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szO[2][4]={"off","on "}; data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:223:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szTxt[256]; data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:264:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szTxt,"Resolution/Color:\r\n- %dx%d ",LOWORD(iWinSize),HIWORD(iWinSize)); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:266:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szTxt,"Resolution/Color:\r\n- %dx%d ",iResX,iResY); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:268:18: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(bWindowMode) sprintf(szTxt,"Window mode\r\n"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:271:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szTxt,"Fullscreen "); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:273:19: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(bChangeRes) sprintf(szTxt,"- Desktop changing [%d Bit]\r\n",iColDepth); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:274:19: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(szTxt,"- NO desktop changing\r\n"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:279:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(szTxt,"- V-Sync: Driver\r\n"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:284:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(szTxt,"Textures:\r\n- "); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:285:26: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(iTexQuality==0) strcat(szTxt,"Default"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:286:26: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else if(iTexQuality==1) strcat(szTxt,"R4G4B4A4"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:287:26: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else if(iTexQuality==2) strcat(szTxt,"R5G5B5A1"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:288:26: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else if(iTexQuality==3) strcat(szTxt,"R8G8A8A8"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:289:26: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else if(iTexQuality==4) strcat(szTxt,"B8G8R8A8"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:290:20: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(!hW && bGLExt) strcat(szTxt," (packed pixels)\r\n"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:291:20: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else strcat(szTxt,"\r\n"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:295:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szTxt,"- Filtering: %d - edge clamping ",iFilterType); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:296:37: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(iClampType==GL_TO_EDGE_CLAMP) strcat(szTxt,"supported\r\n"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:297:37: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else strcat(szTxt,"NOT supported\r\n"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:299:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(szTxt,"- iFiltering: %d\r\n",iFilterType); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:301:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szTxt,"- Hi-Res textures: %d\r\n",iHiResTextures); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:308:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szTxt,"- VRam size: %d MBytes",iVRamSize); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:310:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szTxt+strlen(szTxt)," - %d textures usable\r\n\r\n",iSortTexCnt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:311:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else strcat(szTxt,"\r\n\r\n"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:319:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(szTxt,"- FPS limit: Auto\r\n\r\n"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:320:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(szTxt,"- FPS limit: %.1f\r\n\r\n",fFrameRate); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:323:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szTxt,"Compatibility:\r\n- Offscreen drawing: %d\r\n",iOffscreenDrawing); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:325:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szTxt,"- Framebuffer texture: %d",iFrameTexType); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:328:22: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(gTexFrameName) strcat(szTxt," - texture created\r\n"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:329:22: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else strcat(szTxt," - not used yet\r\n"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:331:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else strcat(szTxt,"\r\n"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:333:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szTxt,"- Framebuffer access: %d\r\n",iFrameReadType); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:342:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(bGLBlend) strcat(szTxt," (hardware)\r\n"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:343:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else strcat(szTxt," (software)\r\n"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:345:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else strcat(szTxt,"\r\n"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:350:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(szTxt,"- Subtractive blending: "); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:353:24: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(bUseMultiPass) strcat(szTxt,"supported, but not used!"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:354:24: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else strcat(szTxt,"activated"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:356:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else strcat(szTxt," NOT supported!"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:357:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(szTxt,"\r\n\r\n"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:359:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(szTxt,"\r\n"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:365:20: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(iUseScanLines) sprintf(szTxt," [%d]\r\n",iScanBlend); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:366:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. else strcpy(szTxt,"\r\n"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:382:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(gTexBlurName) strcat(pB," - supported\r\n"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:383:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else strcat(pB," - not supported\r\n"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:385:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else strcat(pB,"\r\n"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:398:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. FILE *txtfile;char szTxt[256];char * pB; data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:401:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szTxt,"snap\\pcsxr%04d.txt",iNum); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:406:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((txtfile=fopen(szTxt,"wb"))==NULL) data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:425:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. FILE *bmpfile;char filename[256]; data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:426:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char header[0x36];int size; data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:427:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char empty[2]={0,0};int i; data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:470:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(filename,"snap/pcsxr%04d.bmp",snapshotnr); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:474:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). bmpfile=fopen(filename,"rb"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:482:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((bmpfile=fopen(filename,"wb"))==NULL) data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:792:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int myscreen;char gammastr[14]; data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:808:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(gammastr,"SST_GAMMA=%2.1f",fxgamma); // -> set gamma data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:1552:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szDispBuf,"%06.1f",fps_cur); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:2792:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const unsigned char primTableCX[256] = data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3015:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cfg[256]; data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3018:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cfg, "./cfgpeopsxgl"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3032:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cfg, "./cfg/cfgpeopsxgl"); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3178:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char psxVRam[1024*1024*2]; // current VRam image (full 2 MB for ZN) data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3200:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pF->ulControl,ulStatusControl,256*sizeof(uint32_t)); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3201:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pF->psxVRam, psxVub, 1024*iGPUHeight*2); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3209:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ulStatusControl,pF->ulControl,256*sizeof(uint32_t)); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3210:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(psxVub, pF->psxVRam, 1024*iGPUHeight*2); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:3236:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char cFont[10][120]= data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:74:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). out = fopen( "gpuPeopsMesaGL.cfg", "w+" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:235:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char t[256]; data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:343:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). in = fopen( "gpuPeopsMesaGL.cfg", "rb" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:354:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nResX" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:359:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:366:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nResY" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:371:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:378:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nKeepRatio" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:383:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:390:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nForceRatio43" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:395:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:402:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nDithering" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:407:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:414:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nFullScreen" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:419:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:426:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nTexQuality" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:431:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:438:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nTexFilter" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:443:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:450:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nHiResTextures" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:455:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:462:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nVRamSize"); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:467:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:474:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nShowFPS" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:479:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:486:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nUseFrameLimit" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:491:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:498:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nFPSDetection" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:503:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:510:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nFrameRate"); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:515:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:522:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nUseFrameSkip" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:527:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:534:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nOffscreenDrawing" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:539:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:546:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nFrameTextures" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:551:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:558:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nFrameAccess" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:563:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:570:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nMaskDetect" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:575:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:582:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nOpaquePass" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:587:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:594:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nAdvancedBlend" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:599:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:606:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nScanLines" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:611:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:618:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(t,"\nScanLinesBlend"); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:623:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:630:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nFastMdec" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:635:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:642:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\n15bitMdec" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:647:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:654:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nLineMode" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:659:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:666:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nAntiAlias" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:671:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:678:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nOGLExtensions" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:683:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:690:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nScreenSmoothing" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:695:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:702:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nGteAccuracy" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:707:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:714:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nUseFixes" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:719:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:726:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( t, "\nCfgFixes" ); data/pcsxr-1.9.94/plugins/peopsxgl/gpucfg/main.c:731:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( p + len ); data/pcsxr-1.9.94/plugins/peopsxgl/menu.c:1438:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szB[256]; data/pcsxr-1.9.94/plugins/peopsxgl/prim.c:3164:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char pFF9G4Cache[32]; data/pcsxr-1.9.94/plugins/peopsxgl/prim.c:3175:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pFF9G4Cache,baseAddr,32); data/pcsxr-1.9.94/plugins/peopsxgl/soft.c:200:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char dithertable[16] = data/pcsxr-1.9.94/win32/gui/CheatDlg.c:59:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char szDescr[256], szCode[1024]; data/pcsxr-1.9.94/win32/gui/CheatDlg.c:78:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szDescr, "%.8X %.4X\r\n", CheatCodes[i].Addr, CheatCodes[i].Val); data/pcsxr-1.9.94/win32/gui/CheatDlg.c:160:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szFileName[256]; data/pcsxr-1.9.94/win32/gui/CheatDlg.c:161:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szFileTitle[256]; data/pcsxr-1.9.94/win32/gui/CheatDlg.c:162:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szFilter[256]; data/pcsxr-1.9.94/win32/gui/CheatDlg.c:282:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(szFilter, _("PCSXR Cheat Code Files")); data/pcsxr-1.9.94/win32/gui/CheatDlg.c:311:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(szFilter, _("PCSXR Cheat Code Files")); data/pcsxr-1.9.94/win32/gui/CheatDlg.c:392:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/pcsxr-1.9.94/win32/gui/CheatDlg.c:435:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%X", current_valuefrom); data/pcsxr-1.9.94/win32/gui/CheatDlg.c:437:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%X", current_valueto); data/pcsxr-1.9.94/win32/gui/CheatDlg.c:441:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%u", current_valuefrom); data/pcsxr-1.9.94/win32/gui/CheatDlg.c:443:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%u", current_valueto); data/pcsxr-1.9.94/win32/gui/CheatDlg.c:466:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, _("%.8X Current: %u (%.2X), Previous: %u (%.2X)"), data/pcsxr-1.9.94/win32/gui/CheatDlg.c:471:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, _("%.8X Current: %u (%.4X), Previous: %u (%.4X)"), data/pcsxr-1.9.94/win32/gui/CheatDlg.c:476:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, _("%.8X Current: %u (%.8X), Previous: %u (%.8X)"), data/pcsxr-1.9.94/win32/gui/CheatDlg.c:492:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, _("Founded Addresses: %d"), NumSearchResults); data/pcsxr-1.9.94/win32/gui/CheatDlg.c:500:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/pcsxr-1.9.94/win32/gui/CheatDlg.c:508:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%.8X", SearchResults[iCurItem]); data/pcsxr-1.9.94/win32/gui/CheatDlg.c:529:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%u", val); data/pcsxr-1.9.94/win32/gui/CheatDlg.c:545:8: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szCode, "%.8X %.4X", (SearchResults[iCurItem] & 0x1FFFFF) | (CHEAT_CONST8 << 24), val); data/pcsxr-1.9.94/win32/gui/CheatDlg.c:552:8: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szCode, "%.8X %.4X", (SearchResults[iCurItem] & 0x1FFFFF) | (CHEAT_CONST16 << 24), val); data/pcsxr-1.9.94/win32/gui/CheatDlg.c:556:8: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szCode, "%.8X %.4X\n%.8X %.4X", data/pcsxr-1.9.94/win32/gui/CheatDlg.c:566:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(szDescr, _("Freeze %.8X"), SearchResults[iCurItem]); data/pcsxr-1.9.94/win32/gui/CheatDlg.c:591:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/pcsxr-1.9.94/win32/gui/CheatDlg.c:599:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%.8X", SearchResults[iCurItem]); data/pcsxr-1.9.94/win32/gui/CheatDlg.c:620:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%u", val); data/pcsxr-1.9.94/win32/gui/CheatDlg.c:673:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/pcsxr-1.9.94/win32/gui/CheatDlg.c:720:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%.8X", SearchResults[i]); data/pcsxr-1.9.94/win32/gui/CheatDlg.c:974:8: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%u", i); data/pcsxr-1.9.94/win32/gui/CheatDlg.c:979:8: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%u", i); data/pcsxr-1.9.94/win32/gui/CheatDlg.c:986:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%X", i); data/pcsxr-1.9.94/win32/gui/CheatDlg.c:991:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%X", i); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:50:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[256]; data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:178:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpStr[256]; data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:183:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(tmpStr, "*.dll"); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:239:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(lp, "HLE"); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:368:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file[256]; \ data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:444:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file[256]; \ data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:495:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Buffer[256]; data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:516:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Path[256]; data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:525:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Path[256]; data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:628:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpStr[256]; data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:633:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(tmpStr, "*.dll"); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:637:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(lp, "Disabled"); data/pcsxr-1.9.94/win32/gui/NoPic.h:11:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char cFont[10][120]= data/pcsxr-1.9.94/win32/gui/NoPic.h:300:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char pixel_data[128 * 96 * 3 + 1]; data/pcsxr-1.9.94/win32/gui/Win32.h:35:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char cfgfile[256]; data/pcsxr-1.9.94/win32/gui/Win32.h:38:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char PcsxrDir[256]; data/pcsxr-1.9.94/win32/gui/WndMain.c:51:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cfgfile[256]; data/pcsxr-1.9.94/win32/gui/WndMain.c:54:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char PcsxrDir[256]; data/pcsxr-1.9.94/win32/gui/WndMain.c:66:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lang[256]; data/pcsxr-1.9.94/win32/gui/WndMain.c:71:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id[8]; data/pcsxr-1.9.94/win32/gui/WndMain.c:72:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[64]; data/pcsxr-1.9.94/win32/gui/WndMain.c:124:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(Config.Lang, "English"); data/pcsxr-1.9.94/win32/gui/WndMain.c:136:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cdfile[MAXPATHLEN] = "", buf[4096]; data/pcsxr-1.9.94/win32/gui/WndMain.c:139:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cfgfile, "Software\\Pcsxr"); data/pcsxr-1.9.94/win32/gui/WndMain.c:153:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(Config.Net, "Disabled"); data/pcsxr-1.9.94/win32/gui/WndMain.c:156:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(Config.PluginsDir, "Plugins\\"); data/pcsxr-1.9.94/win32/gui/WndMain.c:157:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(Config.BiosDir, "Bios\\"); data/pcsxr-1.9.94/win32/gui/WndMain.c:159:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(Config.Mcd1, "memcards\\Mcd001.mcr"); data/pcsxr-1.9.94/win32/gui/WndMain.c:160:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(Config.Mcd2, "memcards\\Mcd002.mcr"); data/pcsxr-1.9.94/win32/gui/WndMain.c:166:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[256]; data/pcsxr-1.9.94/win32/gui/WndMain.c:180:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(Config.PatchesDir, "Patches\\"); data/pcsxr-1.9.94/win32/gui/WndMain.c:275:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[256]; data/pcsxr-1.9.94/win32/gui/WndMain.c:300:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Text[256]; data/pcsxr-1.9.94/win32/gui/WndMain.c:310:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(Text, _("*PCSXR*: Loaded State %d"), num+1); data/pcsxr-1.9.94/win32/gui/WndMain.c:311:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(Text, _("*PCSXR*: Error Loading State %d"), num+1); data/pcsxr-1.9.94/win32/gui/WndMain.c:320:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Text[256]; data/pcsxr-1.9.94/win32/gui/WndMain.c:332:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(Text, _("*PCSXR*: Saved State %d"), num+1); data/pcsxr-1.9.94/win32/gui/WndMain.c:333:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(Text, _("*PCSXR*: Error Saving State %d"), num+1); data/pcsxr-1.9.94/win32/gui/WndMain.c:343:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szFileName[MAXPATHLEN]; data/pcsxr-1.9.94/win32/gui/WndMain.c:344:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szFileTitle[MAXPATHLEN]; data/pcsxr-1.9.94/win32/gui/WndMain.c:345:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szFilter[256]; data/pcsxr-1.9.94/win32/gui/WndMain.c:351:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(szFilter, _("PCSXR State Format")); data/pcsxr-1.9.94/win32/gui/WndMain.c:370:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Text[256]; data/pcsxr-1.9.94/win32/gui/WndMain.c:389:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szFileName[MAXPATHLEN]; data/pcsxr-1.9.94/win32/gui/WndMain.c:390:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szFileTitle[MAXPATHLEN]; data/pcsxr-1.9.94/win32/gui/WndMain.c:391:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szFilter[256]; data/pcsxr-1.9.94/win32/gui/WndMain.c:397:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(szFilter, _("PCSXR State Format")); data/pcsxr-1.9.94/win32/gui/WndMain.c:416:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Text[256]; data/pcsxr-1.9.94/win32/gui/WndMain.c:434:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char File[256]; data/pcsxr-1.9.94/win32/gui/WndMain.c:852:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mask[16*16]; data/pcsxr-1.9.94/win32/gui/WndMain.c:974:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/pcsxr-1.9.94/win32/gui/WndMain.c:975:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buftitle[256]; data/pcsxr-1.9.94/win32/gui/WndMain.c:1091:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[256]; data/pcsxr-1.9.94/win32/gui/WndMain.c:1135:30: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (!strlen(Config.Mcd1)) strcpy(Config.Mcd1, "memcards\\Mcd001.mcr"); data/pcsxr-1.9.94/win32/gui/WndMain.c:1136:30: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (!strlen(Config.Mcd2)) strcpy(Config.Mcd2, "memcards\\Mcd002.mcr"); data/pcsxr-1.9.94/win32/gui/WndMain.c:1179:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(Mcd1Data + (i+1) * 128, Mcd2Data + (copy+1) * 128, 128); data/pcsxr-1.9.94/win32/gui/WndMain.c:1181:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(Mcd1Data + (i+1) * 1024 * 8, Mcd2Data + (copy+1) * 1024 * 8, 1024 * 8); data/pcsxr-1.9.94/win32/gui/WndMain.c:1188:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(Mcd2Data + (i+1) * 128, Mcd1Data + (copy+1) * 128, 128); data/pcsxr-1.9.94/win32/gui/WndMain.c:1190:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(Mcd2Data + (i+1) * 1024 * 8, Mcd1Data + (copy+1) * 1024 * 8, 1024 * 8); data/pcsxr-1.9.94/win32/gui/WndMain.c:1467:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szFileName[MAXPATHLEN]; data/pcsxr-1.9.94/win32/gui/WndMain.c:1468:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szFileTitle[MAXPATHLEN]; data/pcsxr-1.9.94/win32/gui/WndMain.c:1469:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szFilter[1024]; data/pcsxr-1.9.94/win32/gui/WndMain.c:1476:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(szFilter, _("Psx Mcd Format (*.mcr;*.mc;*.mem;*.vgs;*.mcd;*.gme;*.ddf)")); data/pcsxr-1.9.94/win32/gui/WndMain.c:1478:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(str, "*.mcr;*.mcd;*.mem;*.gme;*.mc;*.ddf"); data/pcsxr-1.9.94/win32/gui/WndMain.c:1481:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(str, _("Psx Memory Card (*.mcr;*.mc)")); data/pcsxr-1.9.94/win32/gui/WndMain.c:1483:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(str, "*.mcr;0*.mc"); data/pcsxr-1.9.94/win32/gui/WndMain.c:1486:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(str, _("CVGS Memory Card (*.mem;*.vgs)")); data/pcsxr-1.9.94/win32/gui/WndMain.c:1488:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(str, "*.mem;*.vgs"); data/pcsxr-1.9.94/win32/gui/WndMain.c:1491:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(str, _("Bleem Memory Card (*.mcd)")); data/pcsxr-1.9.94/win32/gui/WndMain.c:1493:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(str, "*.mcd"); data/pcsxr-1.9.94/win32/gui/WndMain.c:1496:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(str, _("DexDrive Memory Card (*.gme)")); data/pcsxr-1.9.94/win32/gui/WndMain.c:1498:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(str, "*.gme"); data/pcsxr-1.9.94/win32/gui/WndMain.c:1501:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(str, _("DataDeck Memory Card (*.ddf)")); data/pcsxr-1.9.94/win32/gui/WndMain.c:1503:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(str, "*.ddf"); data/pcsxr-1.9.94/win32/gui/WndMain.c:1506:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(str, _("All Files")); data/pcsxr-1.9.94/win32/gui/WndMain.c:1508:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(str, "*.*"); data/pcsxr-1.9.94/win32/gui/WndMain.c:1534:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szFileName[MAXPATHLEN]; data/pcsxr-1.9.94/win32/gui/WndMain.c:1535:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szFileTitle[MAXPATHLEN]; data/pcsxr-1.9.94/win32/gui/WndMain.c:1536:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szFilter[256]; data/pcsxr-1.9.94/win32/gui/WndMain.c:1545:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(szFilter, _("Psx Exe Format")); data/pcsxr-1.9.94/win32/gui/WndMain.c:1570:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szFileName[MAXPATHLEN]; data/pcsxr-1.9.94/win32/gui/WndMain.c:1571:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szFileTitle[MAXPATHLEN]; data/pcsxr-1.9.94/win32/gui/WndMain.c:1572:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szFilter[256]; data/pcsxr-1.9.94/win32/gui/WndMain.c:1582:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(szFilter, _("Psx Isos (*.iso;*.mdf;*.img;*.bin;*.cue;*.pbp;*.cbn)")); data/pcsxr-1.9.94/win32/gui/WndMain.c:1584:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(str, "*.iso;*.mdf;*.img;*.bin;*.cue;*.pbp;*.cbn"); data/pcsxr-1.9.94/win32/gui/WndMain.c:1587:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(str, _("All Files")); data/pcsxr-1.9.94/win32/gui/WndMain.c:1589:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(str, "*.*"); data/pcsxr-1.9.94/win32/gui/WndMain.c:1646:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/pcsxr-1.9.94/win32/gui/WndMain.c:1706:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(langs[0].lang, "English"); data/pcsxr-1.9.94/win32/gui/WndMain.c:1836:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). emuLog = fopen("emuLog.txt","w"); data/pcsxr-1.9.94/win32/gui/WndMain.c:1869:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[512]; data/pcsxr-1.9.94/win32/gui/WndMain.c:1888:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[512]; data/pcsxr-1.9.94/win32/gui/plugin.c:39:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Text[255]; data/pcsxr-1.9.94/win32/gui/plugin.c:59:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pMem, NoPic_Image.pixel_data, 128*96*3); data/pcsxr-1.9.94/win32/gui/plugin.c:70:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char trimlabel[33]; data/pcsxr-1.9.94/win32/gui/plugin.c:79:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(out, "sstates\\%.32s-%.9s.%3.3d", trimlabel, CdromId, i); data/pcsxr-1.9.94/win32/gui/plugin.c:83:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Text[255]; data/pcsxr-1.9.94/win32/gui/plugin.c:94:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(Text, _("*PCSXR*: Saved State %d"), StatesC+1); data/pcsxr-1.9.94/win32/gui/plugin.c:95:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(Text, _("*PCSXR*: Error Saving State %d"), StatesC+1); data/pcsxr-1.9.94/win32/gui/plugin.c:111:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(Text, _("*PCSXR*: Loaded State %d"), StatesC+1); data/pcsxr-1.9.94/win32/gui/plugin.c:112:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(Text, _("*PCSXR*: Error Loading State %d"), StatesC+1); data/pcsxr-1.9.94/win32/gui/plugin.c:123:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(Text, _("*PCSXR*: Sio Irq Always Enabled")); data/pcsxr-1.9.94/win32/gui/plugin.c:124:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(Text, _("*PCSXR*: Sio Irq Not Always Enabled")); data/pcsxr-1.9.94/win32/gui/plugin.c:131:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(Text, _("*PCSXR*: Black&White Mdecs Only Enabled")); data/pcsxr-1.9.94/win32/gui/plugin.c:132:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(Text, _("*PCSXR*: Black&White Mdecs Only Disabled")); data/pcsxr-1.9.94/win32/gui/plugin.c:139:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (Text, _("*PCSXR*: Xa Enabled")); data/pcsxr-1.9.94/win32/gui/plugin.c:140:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf (Text, _("*PCSXR*: Xa Disabled")); data/pcsxr-1.9.94/win32/gui/plugin.c:174:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char charsTable[4] = { "|/-\\" }; data/pcsxr-1.9.94/win32/gui/plugin.c:177:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[256]; data/pcsxr-1.9.94/win32/gui/plugin.c:184:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, _("Please wait while connecting... %c\n"), charsTable[waitState]); data/pcsxr-1.9.94/win32/gui/plugin.c:191:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, _("Please wait while connecting... %c\n"), charsTable[waitState]); data/pcsxr-1.9.94/win32/gui/plugin.c:224:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[256]; data/pcsxr-1.9.94/win32/intl/bindtextdom.c:34:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # ifndef memcpy data/pcsxr-1.9.94/win32/intl/bindtextdom.c:35:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define memcpy(Dst, Src, Num) bcopy (Src, Dst, Num) data/pcsxr-1.9.94/win32/intl/bindtextdom.c:35:33: [2] (buffer) bcopy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define memcpy(Dst, Src, Num) bcopy (Src, Dst, Num) data/pcsxr-1.9.94/win32/intl/bindtextdom.c:95:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (dirname_MOD, dirname, len1); data/pcsxr-1.9.94/win32/intl/bindtextdom.c:155:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (new_dirname, dirname, len); data/pcsxr-1.9.94/win32/intl/bindtextdom.c:192:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (new_binding->domainname, domainname, len); data/pcsxr-1.9.94/win32/intl/bindtextdom.c:212:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (new_binding->dirname, dirname, len); data/pcsxr-1.9.94/win32/intl/finddomain.c:40:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # ifndef memcpy data/pcsxr-1.9.94/win32/intl/finddomain.c:41:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define memcpy(Dst, Src, Num) bcopy (Src, Dst, Num) data/pcsxr-1.9.94/win32/intl/finddomain.c:41:33: [2] (buffer) bcopy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define memcpy(Dst, Src, Num) bcopy (Src, Dst, Num) data/pcsxr-1.9.94/win32/intl/finddomain.c:154:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (locale, alias_value, len); data/pcsxr-1.9.94/win32/intl/gettext.c:69:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16384]; data/pcsxr-1.9.94/win32/intl/gettext.c:70:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char bufout[16384]; data/pcsxr-1.9.94/win32/intl/l10nflist.c:28:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # ifndef memcpy data/pcsxr-1.9.94/win32/intl/l10nflist.c:29:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define memcpy(Dst, Src, Num) bcopy (Src, Dst, Num) data/pcsxr-1.9.94/win32/intl/l10nflist.c:29:33: [2] (buffer) bcopy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define memcpy(Dst, Src, Num) bcopy (Src, Dst, Num) data/pcsxr-1.9.94/win32/intl/l10nflist.c:223:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (abs_filename, dirlist, dirlist_len); data/pcsxr-1.9.94/win32/intl/loadmsgcat.c:52:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). # define open __open data/pcsxr-1.9.94/win32/intl/loadmsgcat.c:93:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open (domain_file->filename, O_RDONLY | O_BINARY); /*FRANCO - binary*/ data/pcsxr-1.9.94/win32/intl/localealias.c:60:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # ifndef memcpy data/pcsxr-1.9.94/win32/intl/localealias.c:61:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define memcpy(Dst, Src, Num) bcopy (Src, Dst, Num) data/pcsxr-1.9.94/win32/intl/localealias.c:61:33: [2] (buffer) bcopy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define memcpy(Dst, Src, Num) bcopy (Src, Dst, Num) data/pcsxr-1.9.94/win32/intl/localealias.c:236:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (full_fname, fname, fname_len); data/pcsxr-1.9.94/win32/intl/localealias.c:237:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (&full_fname[fname_len], aliasfile, sizeof aliasfile); data/pcsxr-1.9.94/win32/intl/localealias.c:240:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen (full_fname, "r"); data/pcsxr-1.9.94/win32/intl/localealias.c:255:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[BUFSIZ]; data/pcsxr-1.9.94/win32/intl/localealias.c:268:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char altbuf[BUFSIZ]; data/pcsxr-1.9.94/win32/intl/localealias.c:338:26: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. map[nmap].alias = memcpy (&string_space[string_space_act], data/pcsxr-1.9.94/win32/intl/localealias.c:342:26: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. map[nmap].value = memcpy (&string_space[string_space_act], data/pcsxr-1.9.94/win32/intl/textdomain.c:29:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # ifndef memcpy data/pcsxr-1.9.94/win32/intl/textdomain.c:30:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define memcpy(Dst, Src, Num) bcopy (Src, Dst, Num) data/pcsxr-1.9.94/win32/intl/textdomain.c:30:33: [2] (buffer) bcopy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define memcpy(Dst, Src, Num) bcopy (Src, Dst, Num) data/pcsxr-1.9.94/win32/intl/textdomain.c:92:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (cp, domainname, len); data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:510:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[64]; data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:514:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (buff, "NONE"); data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:651:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[64]; data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:880:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (buf, cmd40, sizeof (cmd40)); data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:884:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (buf, cmd41, sizeof (cmd41)); data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:928:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (buf, cmd44, sizeof (cmd44)); data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:932:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (buf, cmd45, sizeof (cmd45)); data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:937:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (buf, cmd46, sizeof (cmd46)); data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:941:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (buf, cmd47, sizeof (cmd47)); data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:945:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (buf, cmd4c, sizeof (cmd4c)); data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:949:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (buf, cmd4d, sizeof (cmd4d)); data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:955:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (buf, cmd4f, sizeof (cmd4f)); data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:1054:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char reserved[91]; data/pcsxr-1.9.94/win32/plugins/bladesio1/winsrc/cfg-winapi.c:34:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(settings.ip, "127.0.0.1"); data/pcsxr-1.9.94/win32/plugins/bladesio1/winsrc/cfg-winapi.c:71:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[32]; data/pcsxr-1.9.94/win32/plugins/bladesio1/winsrc/cfg-winapi.c:77:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "%i", settings.port); data/pcsxr-1.9.94/win32/plugins/bladesio1/winsrc/cfg-winapi.c:84:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[32]; data/pcsxr-1.9.94/win32/plugins/bladesio1/winsrc/cfg-winapi.c:94:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). settings.port = atoi(str); data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/debug.c:146:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. HDC hdc;RECT r;HBRUSH hBO;char szB[16]; data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/debug.c:222:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int ch=iSelChannel;char szB[16]; data/pcsxr-1.9.94/win32/plugins/dfsound/winsrc/record.c:48:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szFileName[256]; data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:29:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szKeyDefaults[11]={VK_DELETE,VK_INSERT,VK_HOME,VK_END,VK_PRIOR,VK_NEXT,VK_MULTIPLY,VK_SUBTRACT,VK_ADD,VK_F12,0x00}; data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:30:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szDevName[128]; data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:107:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. HWND hWC;char cs[256];int i;DEVMODE dv; data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:209:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cs,"%.1f",fFrameRate); data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:221:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. HWND hWC;char cs[256];int i,j;char * p; data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:226:8: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). iResX=atol(cs); data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:228:8: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). iResY=atol(p+1); data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:230:21: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iRefreshRate=atol(p+1); // get refreshrate data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:236:12: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). iColDepth=atol(cs); data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:393:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[255]; data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:395:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chFCC[5]; data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:401:1: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(fcc.chFCC,"VIDC"); data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:482:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(RECORD_COMPRESSION_STATE1,RECORD_COMPRESSION1.lpState,RECORD_COMPRESSION1.cbState); data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:499:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(RECORD_COMPRESSION_STATE2,RECORD_COMPRESSION2.lpState,RECORD_COMPRESSION2.cbState); data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:1173:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szName[10]; data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/cfg.c:1235:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int i,j,k;char szB[2];HWND hWC; data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/ddraw.h:1214:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szDriver[MAX_DDDEVICEID_STRING]; data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/ddraw.h:1215:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szDescription[MAX_DDDEVICEID_STRING]; data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/ddraw.h:1225:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szDriver[MAX_DDDEVICEID_STRING]; /* user readable driver name */ data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/ddraw.h:1226:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szDescription[MAX_DDDEVICEID_STRING]; /* user readable description */ data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/draw.c:4260:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szB[256]; data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/key.c:35:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szGPUKeys[11]; data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.c:26:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char RECORD_BUFFER[1600*1200*3]; data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.c:35:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char RECORD_COMPRESSION_STATE1[4096]; data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.c:37:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char RECORD_COMPRESSION_STATE2[4096]; data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.c:55:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char filename[255]; data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.c:61:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(filename,"demo\\demo%04d.AVI",RECORD_INDEX++); data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.c:62:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((data=fopen(filename,"rb"))==NULL) break; data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.c:66:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((data=fopen(filename,"wb"))==NULL) goto error; data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.h:38:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern unsigned char RECORD_BUFFER[1600*1200*3]; data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.h:47:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern unsigned char RECORD_COMPRESSION_STATE1[4096]; data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/record.h:49:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern unsigned char RECORD_COMPRESSION_STATE2[4096]; data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c:30:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szKeyDefaults[7]={VK_DELETE,VK_INSERT,VK_HOME,VK_END,VK_PRIOR,VK_NEXT,0x00}; data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c:87:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. HWND hWC;char cs[256];int i;DEVMODE dv; data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c:244:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cs,"%.2f",fFrameRate); data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c:257:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. HWND hWC;char cs[256];int i,j;char * p; data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c:261:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). iVRamSize=atoi(cs); data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c:268:8: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). iResX=atol(cs); data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c:270:14: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(p) iResY=atol(p+1); data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c:276:12: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). iColDepth=atol(cs); data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c:907:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szName[10]; data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/cfg.c:971:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int i,j,k;char szB[2];HWND hWC; data/pcsxr-1.9.94/win32/plugins/peopsxgl/winsrc/key.c:44:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szGPUKeys[7]; data/pcsxr-1.9.94/win32/zlib/gzio.c:87:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fmode[80]; /* copy of mode, without the compression level */ data/pcsxr-1.9.94/win32/zlib/gzio.c:202:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[20]; data/pcsxr-1.9.94/win32/zlib/gzio.c:205:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "<fd:%d>", fd); /* for debugging */ data/pcsxr-1.9.94/win32/zlib/gzio.c:531:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[Z_PRINTF_BUFSIZE]; data/pcsxr-1.9.94/win32/zlib/gzio.c:556:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[Z_PRINTF_BUFSIZE]; data/pcsxr-1.9.94/win32/zlib/gzio.c:876:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(s->msg, ": "); data/pcsxr-1.9.94/win32/zlib/trees.c:333:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *header = fopen("trees.h", "w"); data/pcsxr-1.9.94/win32/zlib/zutil.c:16:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *z_errmsg[10] = { data/pcsxr-1.9.94/win32/zlib/zutil.h:40:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char *z_errmsg[10]; /* indexed by 2-zlib_error */ data/pcsxr-1.9.94/win32/zlib/zutil.h:102:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fopen((name), (mode), "mbc=60", "ctx=stm", "rfm=fix", "mrs=512") data/pcsxr-1.9.94/win32/zlib/zutil.h:148:30: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). # define F_OPEN(name, mode) fopen((name), (mode)) data/pcsxr-1.9.94/win32/zlib/zutil.h:179:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define zmemcpy memcpy data/pcsxr-1.9.94/gui/ConfDlg.c:71:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(conf) > 0) { \ data/pcsxr-1.9.94/gui/ConfDlg.c:123:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(Config.PluginsDir) == 0) { data/pcsxr-1.9.94/gui/ConfDlg.c:363:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strlen(Config.Gpu) != 0) && data/pcsxr-1.9.94/gui/ConfDlg.c:364:4: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (strlen(Config.Spu) != 0) && data/pcsxr-1.9.94/gui/ConfDlg.c:365:4: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (strlen(Config.Cdr) != 0) && data/pcsxr-1.9.94/gui/ConfDlg.c:367:4: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (strlen(Config.Sio1) != 0) && data/pcsxr-1.9.94/gui/ConfDlg.c:369:4: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (strlen(Config.Pad1) != 0) && data/pcsxr-1.9.94/gui/ConfDlg.c:370:4: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (strlen(Config.Pad2) != 0)) data/pcsxr-1.9.94/gui/ConfDlg.c:388:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(plugin) > 0) { \ data/pcsxr-1.9.94/gui/Config.c:35:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tmp += strlen(name); data/pcsxr-1.9.94/gui/Config.c:48:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tmp += strlen(name); data/pcsxr-1.9.94/gui/Config.c:58:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tmp += strlen(name); data/pcsxr-1.9.94/gui/Config.c:84:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(cfgfile, getenv("HOME"), 200); data/pcsxr-1.9.94/gui/DebugMemory.c:267:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int r = strlen(p); data/pcsxr-1.9.94/gui/GtkGui.c:230:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(trimlabel, CdromLabel, 32); data/pcsxr-1.9.94/gui/GtkGui.c:671:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (strlen(Config.IsoImgDir) <= 0) { data/pcsxr-1.9.94/gui/GtkGui.c:721:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(current_folder, filename, strrchr(filename, '/') - filename); data/pcsxr-1.9.94/gui/GtkGui.c:1082:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (msg[strlen(msg) - 1] == '\n') data/pcsxr-1.9.94/gui/GtkGui.c:1083:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). msg[strlen(msg) - 1] = 0; data/pcsxr-1.9.94/gui/LnxMain.c:269:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(plugin_name) != 0) { data/pcsxr-1.9.94/gui/LnxMain.c:305:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(cfgfile_basename, argv[++i], MAXPATHLEN-100); /* TODO buffer overruns */ data/pcsxr-1.9.94/gui/LnxMain.c:312:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(isofilename, argv[++i], MAXPATHLEN); data/pcsxr-1.9.94/gui/LnxMain.c:316:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(path) + strlen(isofilename) + 1 < MAXPATHLEN) { data/pcsxr-1.9.94/gui/LnxMain.c:316:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(path) + strlen(isofilename) + 1 < MAXPATHLEN) { data/pcsxr-1.9.94/gui/LnxMain.c:317:6: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(path, "/"); data/pcsxr-1.9.94/gui/LnxMain.c:345:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(file, argv[i], MAXPATHLEN); data/pcsxr-1.9.94/gui/LnxMain.c:348:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(path) + strlen(file) + 1 < MAXPATHLEN) { data/pcsxr-1.9.94/gui/LnxMain.c:348:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(path) + strlen(file) + 1 < MAXPATHLEN) { data/pcsxr-1.9.94/gui/LnxMain.c:349:6: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(path, "/"); data/pcsxr-1.9.94/gui/LnxMain.c:523:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(msg); data/pcsxr-1.9.94/gui/MemcardDlg.c:162:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). title = g_convert(Info->sTitle, strlen(Info->sTitle), "UTF-8", data/pcsxr-1.9.94/gui/MemcardDlg.c:257:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). title = g_convert(Info->sTitle, strlen(Info->sTitle), "UTF-8", data/pcsxr-1.9.94/gui/MemcardDlg.c:322:22: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). if (memcard == 1) strncpy(Config.Mcd1, filename, MAXPATHLEN); data/pcsxr-1.9.94/gui/MemcardDlg.c:323:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). else strncpy(Config.Mcd2, filename, MAXPATHLEN); data/pcsxr-1.9.94/gui/MemcardDlg.c:393:17: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). if (mcd == 1) strncpy(Config.Mcd1, name, MAXPATHLEN); data/pcsxr-1.9.94/gui/MemcardDlg.c:394:8: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). else strncpy(Config.Mcd2, name, MAXPATHLEN); data/pcsxr-1.9.94/gui/MemcardDlg.c:676:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(Config.Mcd1)) { data/pcsxr-1.9.94/gui/MemcardDlg.c:682:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(Config.Mcd2)) { data/pcsxr-1.9.94/gui/Plugin.c:325:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ptr = src + strlen(src); \ data/pcsxr-1.9.94/gui/Plugin.c:365:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dotdir, getenv("HOME"), MAXPATHLEN-100); data/pcsxr-1.9.94/gui/Plugin.c:369:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(info.CdromID, CdromId, 9); data/pcsxr-1.9.94/gui/Plugin.c:370:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(info.CdromLabel, CdromLabel, 9); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:165:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t lenstr = strlen(str); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:436:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tocname, isofile, sizeof(tocname)); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:438:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(tocname) >= 4) { data/pcsxr-1.9.94/libpcsxcore/cdriso.c:439:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strcpy(tocname + strlen(tocname) - 4, ".toc"); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:447:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strcpy(tocname + strlen(tocname) - 4, ".cue"); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:451:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). t = strlen(tocname); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:473:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tmp, linebuf, sizeof(linebuf)); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:505:5: [1] (buffer) sscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. sscanf(linebuf, "DATAFILE \"%[^\"]\" #%d %8s", name, &t, time2); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:512:5: [1] (buffer) sscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. sscanf(linebuf, "DATAFILE \"%[^\"]\" %8s", name, time); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:517:4: [1] (buffer) sscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. sscanf(linebuf, "FILE \"%[^\"]\" #%d %8s %8s", name, &t, time, time2); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:577:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(cuename, isofile, sizeof(cuename)); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:579:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(cuename) >= 4) { data/pcsxr-1.9.94/libpcsxcore/cdriso.c:580:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strcpy(cuename + strlen(cuename) - 4, ".cue"); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:604:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(filepath, cuename, sizeof(filepath)); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:623:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dummy, linebuf, sizeof(linebuf)); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:670:8: [1] (buffer) sscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. if (sscanf(linebuf, " INDEX %02d %8s", &t, time) != 2) data/pcsxr-1.9.94/libpcsxcore/cdriso.c:693:8: [1] (buffer) sscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. if (sscanf(linebuf, " PREGAP %8s", time) == 1) { data/pcsxr-1.9.94/libpcsxcore/cdriso.c:702:5: [1] (buffer) sscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. sscanf(linebuf, " FILE %256s", tmpb); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:715:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(incue_fname, tmp, incue_max_len); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:735:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (numtracks == 0 && strlen(isofile) >= 4 && data/pcsxr-1.9.94/libpcsxcore/cdriso.c:736:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strcmp(isofile + strlen(isofile) - 4, ".cue") == 0) data/pcsxr-1.9.94/libpcsxcore/cdriso.c:761:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(ccdname, isofile, sizeof(ccdname)); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:763:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(ccdname) >= 4) { data/pcsxr-1.9.94/libpcsxcore/cdriso.c:764:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strcpy(ccdname + strlen(ccdname) - 4, ".ccd"); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:820:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(mdsname, isofile, sizeof(mdsname)); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:822:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(mdsname) >= 4) { data/pcsxr-1.9.94/libpcsxcore/cdriso.c:823:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strcpy(mdsname + strlen(mdsname) - 4, ".mds"); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:864:7: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (fgetc(fi) < 0xA0) { data/pcsxr-1.9.94/libpcsxcore/cdriso.c:872:31: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). subChanMixed = subChanRaw = (fgetc(fi) ? TRUE : FALSE); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:879:18: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ti[i].type = ((fgetc(fi) == 0xA9) ? CDDA : DATA); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:883:20: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ti[i].start[0] = fgetc(fi); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:884:20: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ti[i].start[1] = fgetc(fi); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:885:20: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ti[i].start[2] = fgetc(fi); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:940:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(isofile) >= 4) data/pcsxr-1.9.94/libpcsxcore/cdriso.c:941:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ext = isofile + strlen(isofile) - 4; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1103:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(isofile) >= 5) data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1104:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ext = isofile + strlen(isofile) - 5; data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1171:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(subname, isoname, sizeof(subname)); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1173:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(subname) >= 4) { data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1174:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strcpy(subname + strlen(subname) - 4, ".sub"); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1191:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(sbiname, isoname, sizeof(sbiname)); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1193:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(sbiname) >= 4) { data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1194:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strcpy(sbiname + strlen(sbiname) - 4, ".sbi"); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1383:11: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int c = fgetc(f); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1390:8: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = fgetc(f); data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1496:4: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (fgetc(cdHandle) == 'E') && data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1497:4: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (fgetc(cdHandle) == 'C') && data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1498:4: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (fgetc(cdHandle) == 'M') && data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1499:4: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (fgetc(cdHandle) == 0x00) && data/pcsxr-1.9.94/libpcsxcore/cdriso.c:1500:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (strncmp((isoname+strlen(isoname)-5), ".ecm", 4)) data/pcsxr-1.9.94/libpcsxcore/cdrom.c:960:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy((char *)&cdr.Result[4], "PCSX", 4); data/pcsxr-1.9.94/libpcsxcore/cheat.c:86:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (buf[0] == '[' && buf[strlen(buf) - 1] == ']') { data/pcsxr-1.9.94/libpcsxcore/cheat.c:102:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf[strlen(buf) - 1] = '\0'; data/pcsxr-1.9.94/libpcsxcore/debug.c:400:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). WriteSocket(reply, strlen(reply)); data/pcsxr-1.9.94/libpcsxcore/debug.c:433:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(cmd) <= 2) { data/pcsxr-1.9.94/libpcsxcore/debug.c:435:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (strlen(cmd) == 3) { data/pcsxr-1.9.94/libpcsxcore/debug.c:1085:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). WriteSocket(reply, strlen(reply)); data/pcsxr-1.9.94/libpcsxcore/debug.c:1106:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). WriteSocket(reply, strlen(reply)); data/pcsxr-1.9.94/libpcsxcore/debug.c:1114:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). WriteSocket(reply, strlen(reply)); data/pcsxr-1.9.94/libpcsxcore/debug.c:1121:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). WriteSocket(reply, strlen(reply)); data/pcsxr-1.9.94/libpcsxcore/debug.c:1128:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). WriteSocket(reply, strlen(reply)); data/pcsxr-1.9.94/libpcsxcore/debug.c:1135:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). WriteSocket(reply, strlen(reply)); data/pcsxr-1.9.94/libpcsxcore/debug.c:1142:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). WriteSocket(reply, strlen(reply)); data/pcsxr-1.9.94/libpcsxcore/debug.c:1149:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). WriteSocket(reply, strlen(reply)); data/pcsxr-1.9.94/libpcsxcore/debug.c:1156:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). WriteSocket(reply, strlen(reply)); data/pcsxr-1.9.94/libpcsxcore/misc.c:111:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(filename)) return -1; data/pcsxr-1.9.94/libpcsxcore/misc.c:133:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strnicmp((char *)&dir->name[0], filename, strlen(filename))) { data/pcsxr-1.9.94/libpcsxcore/misc.c:176:3: [1] (buffer) sscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. sscanf((char *)buf + 12, "BOOT = cdrom:\\%256s", exename); data/pcsxr-1.9.94/libpcsxcore/misc.c:178:4: [1] (buffer) sscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. sscanf((char *)buf + 12, "BOOT = cdrom:%256s", exename); data/pcsxr-1.9.94/libpcsxcore/misc.c:184:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(exename, ptr, 255); data/pcsxr-1.9.94/libpcsxcore/misc.c:232:2: [1] (buffer) sscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. sscanf(filename, "cdrom:\\%256s", exename); data/pcsxr-1.9.94/libpcsxcore/misc.c:289:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(CdromLabel, buf + 52, 32); data/pcsxr-1.9.94/libpcsxcore/misc.c:301:3: [1] (buffer) sscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. sscanf((char *)buf + 12, "BOOT = cdrom:\\%256s", exename); data/pcsxr-1.9.94/libpcsxcore/misc.c:303:4: [1] (buffer) sscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. sscanf((char *)buf + 12, "BOOT = cdrom:%256s", exename); data/pcsxr-1.9.94/libpcsxcore/misc.c:309:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(exename, ptr, 255); data/pcsxr-1.9.94/libpcsxcore/misc.c:327:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(exename); data/pcsxr-1.9.94/libpcsxcore/misc.c:348:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(CdromLabel, CdromId, 9); data/pcsxr-1.9.94/libpcsxcore/misc.c:411:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(CdromId, "SLUS99999", 9); data/pcsxr-1.9.94/libpcsxcore/misc.c:412:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(CdromLabel, "SLUS_999.99", 11); data/pcsxr-1.9.94/libpcsxcore/plugins.c:833:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(IsoFile, filename, MAXPATHLEN); data/pcsxr-1.9.94/libpcsxcore/ppc/pR3000A.c:3527:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ppcPtr += strlen((char *)ppcPtr); data/pcsxr-1.9.94/libpcsxcore/ppf.c:225:11: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). method = fgetc(ppffile); data/pcsxr-1.9.94/libpcsxcore/ppf.c:265:17: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). blockcheck = fgetc(ppffile); data/pcsxr-1.9.94/libpcsxcore/ppf.c:266:11: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). undo = fgetc(ppffile); data/pcsxr-1.9.94/libpcsxcore/ppf.c:307:9: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). anz = fgetc(ppffile); data/pcsxr-1.9.94/libpcsxcore/psxbios.c:942:7: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). v0 = getchar(); pc0 = ra; data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1861:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dir->name, ptr, sizeof(dir->name)); \ data/pcsxr-1.9.94/libpcsxcore/psxbios.c:1945:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namelen = strlen(Ra1+5); \ data/pcsxr-1.9.94/libpcsxcore/sio.c:1260:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(Info->ID, ptr, 12); data/pcsxr-1.9.94/libpcsxcore/sio.c:1262:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(Info->Name, ptr, 16); data/pcsxr-1.9.94/libpcsxcore/socket.c:123:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). WriteSocket(hello, strlen(hello)); data/pcsxr-1.9.94/libpcsxcore/socket.c:175:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buffer, tbuf, r); data/pcsxr-1.9.94/macosx/Plugin.c:70:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ptr = src + strlen(src); \ data/pcsxr-1.9.94/macosx/Plugin.c:107:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(info.CdromID, CdromId, 9); data/pcsxr-1.9.94/macosx/Plugin.c:108:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(info.CdromLabel, CdromLabel, 11); data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cdr-macosx.c:105:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dev_path_length = strlen(psz_buf); data/pcsxr-1.9.94/macosx/plugins/DFCdrom/macsrc/cfg.c:36:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(CdromDev, ""); data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:345:3: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(1000); data/pcsxr-1.9.94/macosx/plugins/DFInput/macsrc/cfg.c:429:3: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(1000); data/pcsxr-1.9.94/plugins/bladesio1/gui.c:99:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (msg[strlen(msg) - 1] == '\n') msg[strlen(msg) - 1] = 0; data/pcsxr-1.9.94/plugins/bladesio1/gui.c:99:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (msg[strlen(msg) - 1] == '\n') msg[strlen(msg) - 1] = 0; data/pcsxr-1.9.94/plugins/bladesio1/gui.c:113:74: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gtk_clipboard_set_text(gtk_clipboard_get(GDK_SELECTION_CLIPBOARD), str, strlen(str)); data/pcsxr-1.9.94/plugins/bladesio1/gui.c:159:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(settings.ip, gtk_entry_get_text(GTK_ENTRY(widget)), sizeof(settings.ip) - 1); data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:126:24: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. while (locked == 0) usleep(5000); data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:214:4: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(5000); data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:224:25: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. while (locked == 0) { usleep(5000); } data/pcsxr-1.9.94/plugins/dfcdrom/cdr.c:249:3: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(5000); data/pcsxr-1.9.94/plugins/dfcdrom/cdrcfg-0.1df/main.c:182:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(CdromDev, gtk_entry_get_text(GTK_ENTRY(gtk_bin_get_child(GTK_BIN(widget)))), 255); data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:153:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(buf, " "); data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:192:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(buf, " "); data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:446:3: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(5000); data/pcsxr-1.9.94/plugins/dfinput/cfg-gtk.c:537:3: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(5000); data/pcsxr-1.9.94/plugins/dfinput/pad.c:84:3: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(1000); data/pcsxr-1.9.94/plugins/dfnet/gui.c:27:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (msg[strlen(msg) - 1] == '\n') msg[strlen(msg) - 1] = 0; data/pcsxr-1.9.94/plugins/dfnet/gui.c:27:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (msg[strlen(msg) - 1] == '\n') msg[strlen(msg) - 1] = 0; data/pcsxr-1.9.94/plugins/dfnet/gui.c:93:74: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gtk_clipboard_set_text(gtk_clipboard_get(GDK_SELECTION_CLIPBOARD), str, strlen(str)); data/pcsxr-1.9.94/plugins/dfnet/gui.c:199:23: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(msg, *args); strcat(msg, " "); data/pcsxr-1.9.94/plugins/dfnet/unix.c:26:2: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(cfg, " "); data/pcsxr-1.9.94/plugins/dfnet/unix.c:108:2: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(100000); data/pcsxr-1.9.94/plugins/dfnet/unix.c:112:2: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(100000); data/pcsxr-1.9.94/plugins/dfsound/openal.c:289:9: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(1); data/pcsxr-1.9.94/plugins/dfsound/spu.c:599:6: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(PAUSE_L); // else sleep for x ms (linux) data/pcsxr-1.9.94/plugins/dfsound/spu.c:927:18: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(1000L); data/pcsxr-1.9.94/plugins/dfsound/spu.c:1258:36: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. while(!bThreadEnded && i<2000) {usleep(1000L);i++;} // -> wait until thread has ended data/pcsxr-1.9.94/plugins/dfsound/xa.c:466:21: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. if (!iUseTimer) usleep(1000); data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:40:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p+=strlen(name); \ data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:48:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p+=strlen(name); \ data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:56:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p+=strlen(name); \ data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:60:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(p, t1, len); \ data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:71:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p+=strlen(name); \ data/pcsxr-1.9.94/plugins/dfxvideo/cfg.c:75:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(p, t1, len); \ data/pcsxr-1.9.94/plugins/dfxvideo/draw.c:1664:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). XDrawImageString(display,window,hGC,2,13,szDispBuf,strlen(szDispBuf)); data/pcsxr-1.9.94/plugins/dfxvideo/fps.c:111:3: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(tickstogo*10 - 200); data/pcsxr-1.9.94/plugins/dfxvideo/fps.c:222:3: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(tickstogo*10 - 200); data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:213:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(pText)>511) return; data/pcsxr-1.9.94/plugins/dfxvideo/gpu.c:330:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fwrite(pB, strlen(pB), 1, txtfile); data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:365:4: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(pB,"\n"); data/pcsxr-1.9.94/plugins/dfxvideo/gpucfg-0.1df/main.c:446:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fwrite(pB,strlen(pB),1,in); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:310:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(szTxt+strlen(szTxt)," - %d textures usable\r\n\r\n",iSortTexCnt); data/pcsxr-1.9.94/plugins/peopsxgl/gpu.c:412:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fwrite(pB,strlen(pB),1,txtfile); data/pcsxr-1.9.94/plugins/peopsxgl/menu.c:1480:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DrawText(hdcMem,szB,strlen(szB),&r, // paint the text (including clipping and word break) data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:116:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SetKey("Bios", Conf->Bios, strlen(Conf->Bios), REG_SZ); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:117:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SetKey("Gpu", Conf->Gpu, strlen(Conf->Gpu), REG_SZ); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:118:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SetKey("Spu", Conf->Spu, strlen(Conf->Spu), REG_SZ); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:119:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SetKey("Cdr", Conf->Cdr, strlen(Conf->Cdr), REG_SZ); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:120:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SetKey("Pad1", Conf->Pad1, strlen(Conf->Pad1), REG_SZ); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:121:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SetKey("Pad2", Conf->Pad2, strlen(Conf->Pad2), REG_SZ); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:122:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SetKey("Sio1", Conf->Sio1, strlen(Conf->Sio1), REG_SZ); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:123:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SetKey("Net", Conf->Net, strlen(Conf->Net), REG_SZ); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:124:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SetKey("Mcd1", Conf->Mcd1, strlen(Conf->Mcd1), REG_SZ); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:125:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SetKey("Mcd2", Conf->Mcd2, strlen(Conf->Mcd2), REG_SZ); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:126:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SetKey("Lang", Conf->Lang, strlen(Conf->Lang), REG_SZ); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:127:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SetKey("PluginsDir", Conf->PluginsDir, strlen(Conf->PluginsDir), REG_SZ); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:128:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SetKey("BiosDir", Conf->BiosDir, strlen(Conf->BiosDir), REG_SZ); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:156:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lp = (char *)malloc(strlen(FindData.cFileName)+8); \ data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:238:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lp = (char *)malloc(strlen("HLE") + 1); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:246:2: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(tmpStr, "*"); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:254:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lp = (char *)malloc(strlen(FindData.cFileName)+8); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:506:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(Path); data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:508:33: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. if (Path[len - 1] != '\\') { strcat(Path,"\\"); } data/pcsxr-1.9.94/win32/gui/ConfigurePlugins.c:636:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lp = (char *)malloc(strlen("Disabled")+8); data/pcsxr-1.9.94/win32/gui/WndMain.c:130:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(dst) + 1; data/pcsxr-1.9.94/win32/gui/WndMain.c:191:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, lpCmdLine, 4096); data/pcsxr-1.9.94/win32/gui/WndMain.c:202:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, lpCmdLine + (arg - buf), 4096); data/pcsxr-1.9.94/win32/gui/WndMain.c:1135:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(Config.Mcd1)) strcpy(Config.Mcd1, "memcards\\Mcd001.mcr"); data/pcsxr-1.9.94/win32/gui/WndMain.c:1136:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(Config.Mcd2)) strcpy(Config.Mcd2, "memcards\\Mcd002.mcr"); data/pcsxr-1.9.94/win32/gui/WndMain.c:1477:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str = szFilter + strlen(szFilter) + 1; data/pcsxr-1.9.94/win32/gui/WndMain.c:1480:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str+= strlen(str) + 1; data/pcsxr-1.9.94/win32/gui/WndMain.c:1482:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str+= strlen(str) + 1; data/pcsxr-1.9.94/win32/gui/WndMain.c:1485:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str+= strlen(str) + 1; data/pcsxr-1.9.94/win32/gui/WndMain.c:1487:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str+= strlen(str) + 1; data/pcsxr-1.9.94/win32/gui/WndMain.c:1490:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str+= strlen(str) + 1; data/pcsxr-1.9.94/win32/gui/WndMain.c:1492:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str+= strlen(str) + 1; data/pcsxr-1.9.94/win32/gui/WndMain.c:1495:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str+= strlen(str) + 1; data/pcsxr-1.9.94/win32/gui/WndMain.c:1497:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str+= strlen(str) + 1; data/pcsxr-1.9.94/win32/gui/WndMain.c:1500:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str+= strlen(str) + 1; data/pcsxr-1.9.94/win32/gui/WndMain.c:1502:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str+= strlen(str) + 1; data/pcsxr-1.9.94/win32/gui/WndMain.c:1505:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str+= strlen(str) + 1; data/pcsxr-1.9.94/win32/gui/WndMain.c:1507:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str+= strlen(str) + 1; data/pcsxr-1.9.94/win32/gui/WndMain.c:1583:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str = szFilter + strlen(szFilter) + 1; data/pcsxr-1.9.94/win32/gui/WndMain.c:1586:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str += strlen(str) + 1; data/pcsxr-1.9.94/win32/gui/WndMain.c:1588:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str += strlen(str) + 1; data/pcsxr-1.9.94/win32/gui/WndMain.c:1878:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). WriteConsole(hConsole, msg, (DWORD)strlen(msg), &tmp, 0); data/pcsxr-1.9.94/win32/gui/plugin.c:73:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(trimlabel, CdromLabel, 32); data/pcsxr-1.9.94/win32/gui/plugin.c:207:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ptr = src + strlen(src); \ data/pcsxr-1.9.94/win32/gui/plugin.c:227:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(info.CdromID, CdromId, 9); data/pcsxr-1.9.94/win32/gui/plugin.c:228:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(info.CdromLabel, CdromLabel, 9); data/pcsxr-1.9.94/win32/intl/bindtextdom.c:84:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len=strlen(dirname); data/pcsxr-1.9.94/win32/intl/bindtextdom.c:91:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len1 = strlen (dirname) + 1; data/pcsxr-1.9.94/win32/intl/bindtextdom.c:148:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen (dirname) + 1; data/pcsxr-1.9.94/win32/intl/bindtextdom.c:186:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen (domainname) + 1; data/pcsxr-1.9.94/win32/intl/bindtextdom.c:206:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen (dirname) + 1; data/pcsxr-1.9.94/win32/intl/dcgettext.c:270:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t dirname_len = strlen (binding->dirname) + 1; data/pcsxr-1.9.94/win32/intl/dcgettext.c:305:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). xdomainname = (char *) alloca (strlen (categoryname) data/pcsxr-1.9.94/win32/intl/dcgettext.c:306:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen (domainname) + 5); data/pcsxr-1.9.94/win32/intl/dcgettext.c:314:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). single_locale = (char *) alloca (strlen (categoryvalue) + 1); data/pcsxr-1.9.94/win32/intl/dcgettext.c:412:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nls_uint32 len = strlen (msgid); data/pcsxr-1.9.94/win32/intl/finddomain.c:113:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen (dirname) + 1, 0, locale, NULL, NULL, data/pcsxr-1.9.94/win32/intl/finddomain.c:149:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen (alias_value) + 1; data/pcsxr-1.9.94/win32/intl/finddomain.c:168:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen (dirname) + 1, mask, language, territory, data/pcsxr-1.9.94/win32/intl/l10nflist.c:88:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t part_len = strlen (argz); data/pcsxr-1.9.94/win32/intl/l10nflist.c:112:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t part_len = strlen (argz); data/pcsxr-1.9.94/win32/intl/l10nflist.c:196:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen (language) data/pcsxr-1.9.94/win32/intl/l10nflist.c:198:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ? strlen (territory) + 1 : 0) data/pcsxr-1.9.94/win32/intl/l10nflist.c:200:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ? strlen (codeset) + 1 : 0) data/pcsxr-1.9.94/win32/intl/l10nflist.c:202:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ? strlen (normalized_codeset) + 1 : 0) data/pcsxr-1.9.94/win32/intl/l10nflist.c:205:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ? strlen (modifier) + 1 : 0) data/pcsxr-1.9.94/win32/intl/l10nflist.c:207:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ? strlen (special) + 1 : 0) data/pcsxr-1.9.94/win32/intl/l10nflist.c:211:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ? strlen (sponsor) + 1 : 0) data/pcsxr-1.9.94/win32/intl/l10nflist.c:213:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ? strlen (revision) + 1 : 0)) : 0) data/pcsxr-1.9.94/win32/intl/l10nflist.c:214:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + 1 + strlen (filename) + 1); data/pcsxr-1.9.94/win32/intl/l10nflist.c:337:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). = _nl_make_l10nflist (l10nfile_list, dir, strlen (dir) + 1, cnt, data/pcsxr-1.9.94/win32/intl/loadmsgcat.c:54:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). # define read __read data/pcsxr-1.9.94/win32/intl/loadmsgcat.c:137:29: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). long int nb = (long int) read (fd, read_ptr, to_read); data/pcsxr-1.9.94/win32/intl/localealias.c:319:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). alias_len = strlen (alias) + 1; data/pcsxr-1.9.94/win32/intl/localealias.c:320:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). value_len = strlen (value) + 1; data/pcsxr-1.9.94/win32/intl/textdomain.c:89:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen (domainname) + 1; data/pcsxr-1.9.94/win32/plugins/PadSSSPSX/PadSSSPSX.cpp:528:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buff[strlen (buff) -4] = '\0'; data/pcsxr-1.9.94/win32/plugins/bladesio1/winsrc/cfg-winapi.c:60:60: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). RegSetValueEx(myKey, "ip", 0, REG_SZ, (BYTE*)settings.ip, strlen(settings.ip)); data/pcsxr-1.9.94/win32/plugins/dfxvideo/winsrc/draw.c:4302:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). DrawText(hdcMem,szB,strlen(szB),&r, // paint the text (including clipping and word break) data/pcsxr-1.9.94/win32/zlib/gzio.c:108:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s->path = (char*)ALLOC(strlen(path)+1); data/pcsxr-1.9.94/win32/zlib/gzio.c:542:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); /* some *sprintf don't return the nb of bytes written */ data/pcsxr-1.9.94/win32/zlib/gzio.c:566:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); /* old sprintf doesn't return the nb of bytes written */ data/pcsxr-1.9.94/win32/zlib/gzio.c:596:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return gzwrite(file, (char*)s, (unsigned)strlen(s)); data/pcsxr-1.9.94/win32/zlib/gzio.c:874:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s->msg = (char*)ALLOC(strlen(s->path) + strlen(m) + 3); data/pcsxr-1.9.94/win32/zlib/gzio.c:874:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s->msg = (char*)ALLOC(strlen(s->path) + strlen(m) + 3); data/pcsxr-1.9.94/win32/zlib/infblock.c:212:39: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). z->total_out + (q >= s->read ? q - s->read : data/pcsxr-1.9.94/win32/zlib/infblock.c:212:53: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). z->total_out + (q >= s->read ? q - s->read : data/pcsxr-1.9.94/win32/zlib/infblock.c:213:28: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (s->end - s->read) + (q - s->window)))); data/pcsxr-1.9.94/win32/zlib/infblock.c:346:39: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). z->total_out + (q >= s->read ? q - s->read : data/pcsxr-1.9.94/win32/zlib/infblock.c:346:53: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). z->total_out + (q >= s->read ? q - s->read : data/pcsxr-1.9.94/win32/zlib/infblock.c:347:28: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (s->end - s->read) + (q - s->window)))); data/pcsxr-1.9.94/win32/zlib/infblock.c:356:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (s->read != s->write) data/pcsxr-1.9.94/win32/zlib/infcodes.c:226:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (s->read != s->write) data/pcsxr-1.9.94/win32/zlib/infutil.c:34:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). q = s->read; data/pcsxr-1.9.94/win32/zlib/infutil.h:56:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). Bytef *read; /* window read pointer */ data/pcsxr-1.9.94/win32/zlib/infutil.h:78:28: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define WAVAIL (uInt)(q<s->read?s->read-q-1:s->end-q) data/pcsxr-1.9.94/win32/zlib/infutil.h:80:32: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define WRAP {if(q==s->end&&s->read!=s->window){q=s->window;m=(uInt)WAVAIL;}} ANALYSIS SUMMARY: Hits = 1951 Lines analyzed = 161277 in approximately 4.35 seconds (37080 lines/second) Physical Source Lines of Code (SLOC) = 120654 Hits@level = [0] 471 [1] 280 [2] 1217 [3] 59 [4] 393 [5] 2 Hits@level+ = [0+] 2422 [1+] 1951 [2+] 1671 [3+] 454 [4+] 395 [5+] 2 Hits/KSLOC@level+ = [0+] 20.0739 [1+] 16.1702 [2+] 13.8495 [3+] 3.76283 [4+] 3.27382 [5+] 0.0165763 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.