Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c
Examining data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_device.c
Examining data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_fd_stream.c
Examining data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_pollset.c
Examining data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c
Examining data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_clock.c
Examining data/php-zmq-1.1.3/zmq-1.1.3/php5/php_zmq.h
Examining data/php-zmq-1.1.3/zmq-1.1.3/php5/php_zmq_private.h
Examining data/php-zmq-1.1.3/zmq-1.1.3/php5/php_zmq_pollset.h
Examining data/php-zmq-1.1.3/zmq-1.1.3/php_zmq_private.h
Examining data/php-zmq-1.1.3/zmq-1.1.3/php_zmq_pollset.h
Examining data/php-zmq-1.1.3/zmq-1.1.3/zmq_device.c
Examining data/php-zmq-1.1.3/zmq-1.1.3/zmq_fd_stream.c
Examining data/php-zmq-1.1.3/zmq-1.1.3/zmq_clock.c
Examining data/php-zmq-1.1.3/zmq-1.1.3/zmq_object_access.c
Examining data/php-zmq-1.1.3/zmq-1.1.3/zmq_helpers.c
Examining data/php-zmq-1.1.3/zmq-1.1.3/zmq_shared_ctx.c
Examining data/php-zmq-1.1.3/zmq-1.1.3/zmq_pollset.c
Examining data/php-zmq-1.1.3/zmq-1.1.3/php_zmq.h
Examining data/php-zmq-1.1.3/zmq-1.1.3/zmq.c
Examining data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c

FINAL RESULTS:

data/php-zmq-1.1.3/zmq-1.1.3/php5/php_zmq_pollset.h:79:66:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
zend_bool php_zmq_pollset_get_key(php_zmq_pollset *set, int pos, char key[35], int *key_len TSRMLS_DC);
data/php-zmq-1.1.3/zmq-1.1.3/php5/php_zmq_pollset.h:84:63:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
zend_bool php_zmq_pollset_delete_by_key(php_zmq_pollset *set, char key[35], int key_len TSRMLS_DC);
data/php-zmq-1.1.3/zmq-1.1.3/php5/php_zmq_private.h:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[35];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:113:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void php_zmq_get_lib_version(char buffer[PHP_ZMQ_VERSION_LEN]) 
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:213:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char plist_key[48];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:700:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(zmq_msg_data(&message), message_param, message_param_len);
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:1173:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[35];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:1521:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (&cb->fci, fci, sizeof (*fci));
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:1522:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (&cb->fci_cache, fci_cache, sizeof (*fci_cache));
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:2664:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char version[PHP_ZMQ_VERSION_LEN];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:2675:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&zmq_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers));
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:2676:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&zmq_context_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers));
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:2677:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&zmq_socket_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers));
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:2678:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&zmq_poll_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers));
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:2679:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&zmq_device_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers));
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:2682:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&zmq_cert_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers));
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:2683:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&zmq_auth_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers));
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq.c:2849:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char version[PHP_ZMQ_VERSION_LEN];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_pollset.c:108:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char digest[16];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_pollset.c:125:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static void php_zmq_create_key(zval *entry, char key[35], int *key_len TSRMLS_DC)
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_pollset.c:130:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char hash[33];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_pollset.c:136:66:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
zend_bool php_zmq_pollset_get_key(php_zmq_pollset *set, int pos, char key[35], int *key_len TSRMLS_DC)
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_pollset.c:145:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(key, set->php_items[pos].key, set->php_items[pos].key_len + 1);
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_pollset.c:153:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[35];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_pollset.c:238:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pollset->php_items[pollset->num_php_items].key, key, key_len + 1);
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_pollset.c:279:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(target->key, source->key, source->key_len + 1);
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_pollset.c:282:63:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
zend_bool php_zmq_pollset_delete_by_key(php_zmq_pollset *set, char key[35], int key_len TSRMLS_DC)
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_pollset.c:317:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[35];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:101:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:747:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:1457:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:2183:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:2887:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:3109:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:3174:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:3802:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:4024:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:4089:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:4813:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:5035:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:5100:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:5191:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:5204:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:5230:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:5243:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:5256:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/php5/zmq_sockopt.c:5321:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/zmq.c:348:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char public_key[PHP_ZMQ_KEY_SIZE], secret_key[PHP_ZMQ_KEY_SIZE];
data/php-zmq-1.1.3/zmq-1.1.3/zmq.c:808:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(zmq_msg_data(&message), message_param->val, message_param->len);
data/php-zmq-1.1.3/zmq-1.1.3/zmq.c:1597:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (&cb->fci, fci, sizeof (zend_fcall_info));
data/php-zmq-1.1.3/zmq-1.1.3/zmq.c:1598:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (&cb->fci_cache, fci_cache, sizeof (zend_fcall_info_cache));
data/php-zmq-1.1.3/zmq-1.1.3/zmq.c:2785:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&zmq_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers));
data/php-zmq-1.1.3/zmq-1.1.3/zmq.c:2786:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&zmq_context_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers));
data/php-zmq-1.1.3/zmq-1.1.3/zmq.c:2787:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&zmq_socket_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers));
data/php-zmq-1.1.3/zmq-1.1.3/zmq.c:2788:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&zmq_poll_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers));
data/php-zmq-1.1.3/zmq-1.1.3/zmq.c:2789:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&zmq_device_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers));
data/php-zmq-1.1.3/zmq-1.1.3/zmq.c:2792:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&zmq_cert_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers));
data/php-zmq-1.1.3/zmq-1.1.3/zmq.c:2793:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&zmq_auth_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers));
data/php-zmq-1.1.3/zmq-1.1.3/zmq_pollset.c:101:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (&(set->items[index]), item, sizeof(zmq_pollitem_t));
data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:549:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:595:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:611:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:642:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char value[32];
data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:658:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char value[32];
data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:674:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char value[32];
data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:720:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:736:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:896:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:1216:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:1356:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:1676:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char value[255];
data/php-zmq-1.1.3/zmq-1.1.3/zmq_sockopt.c:1747:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char value[255];

ANALYSIS SUMMARY:

Hits = 72
Lines analyzed = 19116 in approximately 0.39 seconds (49051 lines/second)
Physical Source Lines of Code (SLOC) = 13891
Hits@level = [0]  12 [1]   0 [2]  72 [3]   0 [4]   0 [5]   0
Hits@level+ = [0+]  84 [1+]  72 [2+]  72 [3+]   0 [4+]   0 [5+]   0
Hits/KSLOC@level+ = [0+] 6.04708 [1+] 5.18321 [2+] 5.18321 [3+]   0 [4+]   0 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.