Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack_unpack.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack_pack.c
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack_errors.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_define.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/unpack_template.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/version.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/sysdep.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/unpack_define.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/php_msgpack.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack_convert.c
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack_class.c
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack_unpack.c
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack_convert.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack_pack.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack_class.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack.c
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack_unpack.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack_pack.c
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack_errors.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/version_master.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_define.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/unpack_template.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/version.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/sysdep.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/unpack_define.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/php_msgpack.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack_convert.c
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack_class.c
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack_unpack.c
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack_convert.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack_pack.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack_class.h
Examining data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack.c

FINAL RESULTS:

data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/sysdep.h:17:12:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#   define snprintf(buf, len, format,...) _snprintf_s(buf, len, len, format, __VA_ARGS__)
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:55:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char buf[2] = {0xcc, TAKE8_8(d)}; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:67:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char buf[2] = {0xcc, TAKE8_16(d)}; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:71:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char buf[3]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:85:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char buf[2] = {0xcc, TAKE8_32(d)}; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:91:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char buf[3]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:96:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char buf[5]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:111:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char buf[2] = {0xcc, TAKE8_64(d)}; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:117:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char buf[3]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:122:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char buf[5]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:127:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char buf[9]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:138:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char buf[2] = {0xd0, TAKE8_8(d)}; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:151:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char buf[3]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:156:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char buf[2] = {0xd0, TAKE8_16(d)}; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:165:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char buf[2] = {0xcc, TAKE8_16(d)}; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:169:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char buf[3]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:181:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char buf[5]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:186:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char buf[3]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:191:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char buf[2] = {0xd0, TAKE8_32(d)}; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:200:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char buf[2] = {0xcc, TAKE8_32(d)}; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:204:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char buf[3]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:209:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char buf[5]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:222:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				unsigned char buf[9]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:227:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				unsigned char buf[5]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:234:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				unsigned char buf[3]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:239:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				unsigned char buf[2] = {0xd0, TAKE8_64(d)}; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:250:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				unsigned char buf[2] = {0xcc, TAKE8_64(d)}; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:254:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				unsigned char buf[3]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:261:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				unsigned char buf[5]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:266:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				unsigned char buf[9]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:279:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[2] = {0xcc, TAKE8_8(d)};
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:285:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[3];
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:292:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[5];
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:299:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[9];
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:306:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[2] = {0xd0, TAKE8_8(d)};
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:312:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[3];
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:319:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[5];
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:326:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[9];
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:638:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[5];
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:647:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[9];
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:692:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char buf[3];
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:696:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char buf[5];
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:713:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char buf[3];
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:717:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char buf[5];
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:735:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char buf[2];
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:739:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char buf[3];
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/pack_template.h:743:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char buf[5];
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/sysdep.h:107:42:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	do { uint16_t val = _msgpack_be16(num); memcpy(to, &val, 2); } while(0);
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/sysdep.h:109:42:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	do { uint32_t val = _msgpack_be32(num); memcpy(to, &val, 4); } while(0);
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack/sysdep.h:111:42:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	do { uint64_t val = _msgpack_be64(num); memcpy(to, &val, 8); } while(0);
data/php-msgpack-2.1.0+0.5.7/msgpack-0.5.7/msgpack_pack.c:50:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char id[32], *p;
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:53:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[2] = {0xcc, TAKE8_8(d)}; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:65:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[2] = {0xcc, TAKE8_16(d)}; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:69:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[3]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:83:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char buf[2] = {0xcc, TAKE8_32(d)}; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:89:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char buf[3]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:94:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char buf[5]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:109:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char buf[2] = {0xcc, TAKE8_64(d)}; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:115:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char buf[3]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:120:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char buf[5]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:125:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char buf[9]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:136:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[2] = {0xd0, TAKE8_8(d)}; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:149:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char buf[3]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:154:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char buf[2] = {0xd0, TAKE8_16(d)}; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:163:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char buf[2] = {0xcc, TAKE8_16(d)}; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:167:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char buf[3]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:179:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char buf[5]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:184:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char buf[3]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:189:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char buf[2] = {0xd0, TAKE8_32(d)}; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:198:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char buf[2] = {0xcc, TAKE8_32(d)}; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:202:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char buf[3]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:207:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char buf[5]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:220:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                unsigned char buf[9]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:225:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                unsigned char buf[5]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:232:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                unsigned char buf[3]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:237:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                unsigned char buf[2] = {0xd0, TAKE8_64(d)}; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:248:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                unsigned char buf[2] = {0xcc, TAKE8_64(d)}; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:252:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                unsigned char buf[3]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:259:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                unsigned char buf[5]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:264:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                unsigned char buf[9]; \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:277:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[2] = {0xcc, TAKE8_8(d)};
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:283:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[3];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:290:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[5];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:297:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[9];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:304:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[2] = {0xd0, TAKE8_8(d)};
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:310:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[3];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:317:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[5];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:324:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[9];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:657:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[5];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:666:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[9];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:719:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[3];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:723:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[5];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:740:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[3];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:744:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[5];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:761:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[2];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:765:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[3];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:769:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[5];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:790:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[3];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:794:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[5];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:812:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[2];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:816:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[3];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:820:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[5];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:839:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[2];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:845:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[2];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:851:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[2];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:857:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[2];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:863:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[2];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:870:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char buf[3];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:876:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char buf[4];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:882:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char buf[6];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:903:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[4];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:910:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[8];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/pack_template.h:917:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[12];
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/sysdep.h:161:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((cast*)(to), (from), sizeof(cast)); \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/sysdep.h:166:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((cast*)(to), (from), sizeof(cast)); \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/sysdep.h:170:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((cast*)(to), (from), sizeof(cast)); \
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/sysdep.h:175:45:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    do { uint16_t val = _msgpack_be16(num); memcpy(to, &val, 2); } while(0)
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/sysdep.h:177:45:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    do { uint32_t val = _msgpack_be32(num); memcpy(to, &val, 4); } while(0)
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack/sysdep.h:179:45:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    do { uint64_t val = _msgpack_be64(num); memcpy(to, &val, 8); } while(0)
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack_class.c:488:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&msgpack_handlers, zend_get_std_object_handlers(),sizeof msgpack_handlers);
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack_class.c:498:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&msgpack_unpacker_handlers, zend_get_std_object_handlers(),sizeof msgpack_unpacker_handlers);
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack_pack.c:40:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char id[32], *p;
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack_unpack.c:429:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[0x20] = {0}, *ptr = print_u64_to_buf(&buf[sizeof(buf)-1], data);
data/php-msgpack-2.1.0+0.5.7/msgpack-2.1.0/msgpack_unpack.c:226:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    class_name, strlen(class_name),

ANALYSIS SUMMARY:

Hits = 124
Lines analyzed = 9712 in approximately 0.22 seconds (45161 lines/second)
Physical Source Lines of Code (SLOC) = 7736
Hits@level = [0]   0 [1]   1 [2] 122 [3]   0 [4]   1 [5]   0
Hits@level+ = [0+] 124 [1+] 124 [2+] 123 [3+]   1 [4+]   1 [5+]   0
Hits/KSLOC@level+ = [0+] 16.029 [1+] 16.029 [2+] 15.8997 [3+] 0.129266 [4+] 0.129266 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.