Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c Examining data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_device.c Examining data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_fd_stream.c Examining data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_pollset.c Examining data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c Examining data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_clock.c Examining data/php-zmq-1.1.3/zmq-1.1.3/php5/php_zmq.h Examining data/php-zmq-1.1.3/zmq-1.1.3/php5/php_zmq_private.h Examining data/php-zmq-1.1.3/zmq-1.1.3/php5/php_zmq_pollset.h Examining data/php-zmq-1.1.3/zmq-1.1.3/php_zmq_private.h Examining data/php-zmq-1.1.3/zmq-1.1.3/php_zmq_pollset.h Examining data/php-zmq-1.1.3/zmq-1.1.3/zmq_device.c Examining data/php-zmq-1.1.3/zmq-1.1.3/zmq_fd_stream.c Examining data/php-zmq-1.1.3/zmq-1.1.3/zmq_clock.c Examining data/php-zmq-1.1.3/zmq-1.1.3/zmq_object_access.c Examining data/php-zmq-1.1.3/zmq-1.1.3/zmq_helpers.c Examining data/php-zmq-1.1.3/zmq-1.1.3/zmq_shared_ctx.c Examining data/php-zmq-1.1.3/zmq-1.1.3/zmq_pollset.c Examining data/php-zmq-1.1.3/zmq-1.1.3/php_zmq.h Examining data/php-zmq-1.1.3/zmq-1.1.3/zmq.c Examining data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c FINAL RESULTS: data/php-zmq-1.1.3/zmq-1.1.3/php5/php_zmq_pollset.h:79:66: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. zend_bool php_zmq_pollset_get_key(php_zmq_pollset *set, int pos, char key[35], int *key_len TSRMLS_DC); data/php-zmq-1.1.3/zmq-1.1.3/php5/php_zmq_pollset.h:84:63: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. zend_bool php_zmq_pollset_delete_by_key(php_zmq_pollset *set, char key[35], int key_len TSRMLS_DC); data/php-zmq-1.1.3/zmq-1.1.3/php5/php_zmq_private.h:58:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[35]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:113:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static void php_zmq_get_lib_version(char buffer[PHP_ZMQ_VERSION_LEN]) data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:213:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char plist_key[48]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:700:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zmq_msg_data(&message), message_param, message_param_len); data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:1173:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[35]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:1521:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (&cb->fci, fci, sizeof (*fci)); data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:1522:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (&cb->fci_cache, fci_cache, sizeof (*fci_cache)); data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:2664:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[PHP_ZMQ_VERSION_LEN]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:2675:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zmq_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers)); data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:2676:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zmq_context_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers)); data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:2677:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zmq_socket_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers)); data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:2678:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zmq_poll_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers)); data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:2679:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zmq_device_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers)); data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:2682:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zmq_cert_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers)); data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:2683:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zmq_auth_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers)); data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:2849:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[PHP_ZMQ_VERSION_LEN]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_pollset.c:108:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char digest[16]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_pollset.c:125:45: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static void php_zmq_create_key(zval *entry, char key[35], int *key_len TSRMLS_DC) data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_pollset.c:130:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hash[33]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_pollset.c:136:66: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. zend_bool php_zmq_pollset_get_key(php_zmq_pollset *set, int pos, char key[35], int *key_len TSRMLS_DC) data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_pollset.c:145:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(key, set->php_items[pos].key, set->php_items[pos].key_len + 1); data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_pollset.c:153:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[35]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_pollset.c:238:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pollset->php_items[pollset->num_php_items].key, key, key_len + 1); data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_pollset.c:279:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(target->key, source->key, source->key_len + 1); data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_pollset.c:282:63: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. zend_bool php_zmq_pollset_delete_by_key(php_zmq_pollset *set, char key[35], int key_len TSRMLS_DC) data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_pollset.c:317:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[35]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:101:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:747:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:1457:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:2183:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:2887:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:3109:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:3174:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:3802:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:4024:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:4089:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:4813:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:5035:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:5100:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:5191:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:5204:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:5230:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:5243:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:5256:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:5321:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/zmq.c:348:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char public_key[PHP_ZMQ_KEY_SIZE], secret_key[PHP_ZMQ_KEY_SIZE]; data/php-zmq-1.1.3/zmq-1.1.3/zmq.c:808:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zmq_msg_data(&message), message_param->val, message_param->len); data/php-zmq-1.1.3/zmq-1.1.3/zmq.c:1597:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (&cb->fci, fci, sizeof (zend_fcall_info)); data/php-zmq-1.1.3/zmq-1.1.3/zmq.c:1598:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (&cb->fci_cache, fci_cache, sizeof (zend_fcall_info_cache)); data/php-zmq-1.1.3/zmq-1.1.3/zmq.c:2785:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zmq_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers)); data/php-zmq-1.1.3/zmq-1.1.3/zmq.c:2786:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zmq_context_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers)); data/php-zmq-1.1.3/zmq-1.1.3/zmq.c:2787:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zmq_socket_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers)); data/php-zmq-1.1.3/zmq-1.1.3/zmq.c:2788:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zmq_poll_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers)); data/php-zmq-1.1.3/zmq-1.1.3/zmq.c:2789:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zmq_device_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers)); data/php-zmq-1.1.3/zmq-1.1.3/zmq.c:2792:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zmq_cert_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers)); data/php-zmq-1.1.3/zmq-1.1.3/zmq.c:2793:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&zmq_auth_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers)); data/php-zmq-1.1.3/zmq-1.1.3/zmq_pollset.c:101:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (&(set->items[index]), item, sizeof(zmq_pollitem_t)); data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:549:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:595:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:611:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:642:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[32]; data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:658:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[32]; data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:674:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[32]; data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:720:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:736:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:896:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:1216:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:1356:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:1676:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:1747:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[255]; ANALYSIS SUMMARY: Hits = 72 Lines analyzed = 19116 in approximately 0.39 seconds (49051 lines/second) Physical Source Lines of Code (SLOC) = 13891 Hits@level = [0] 12 [1] 0 [2] 72 [3] 0 [4] 0 [5] 0 Hits@level+ = [0+] 84 [1+] 72 [2+] 72 [3+] 0 [4+] 0 [5+] 0 Hits/KSLOC@level+ = [0+] 6.04708 [1+] 5.18321 [2+] 5.18321 [3+] 0 [4+] 0 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.