Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/pybluez-0.23/bluez/btmodule.c
Examining data/pybluez-0.23/bluez/btmodule.h
Examining data/pybluez-0.23/bluez/btsdp.c
Examining data/pybluez-0.23/bluez/btsdp.h
Examining data/pybluez-0.23/macos/LightAquaBlue/BBBluetoothChannelDelegate.h
Examining data/pybluez-0.23/macos/LightAquaBlue/BBBluetoothOBEXClient.h
Examining data/pybluez-0.23/macos/LightAquaBlue/BBBluetoothOBEXServer.h
Examining data/pybluez-0.23/macos/LightAquaBlue/BBLocalDevice.h
Examining data/pybluez-0.23/macos/LightAquaBlue/BBMutableOBEXHeaderSet.h
Examining data/pybluez-0.23/macos/LightAquaBlue/BBOBEXHeaderSet.h
Examining data/pybluez-0.23/macos/LightAquaBlue/BBOBEXRequest.h
Examining data/pybluez-0.23/macos/LightAquaBlue/BBOBEXRequestHandler.h
Examining data/pybluez-0.23/macos/LightAquaBlue/BBOBEXResponse.h
Examining data/pybluez-0.23/macos/LightAquaBlue/BBServiceAdvertiser.h
Examining data/pybluez-0.23/macos/LightAquaBlue/BBStreamingInputStream.h
Examining data/pybluez-0.23/macos/LightAquaBlue/BBStreamingOutputStream.h
Examining data/pybluez-0.23/macos/LightAquaBlue/LightAquaBlue.h
Examining data/pybluez-0.23/msbt/_msbt.c
Examining data/pybluez-0.23/port3/port3.h
Examining data/pybluez-0.23/widcomm/_widcomm.cpp
Examining data/pybluez-0.23/widcomm/inquirer.cpp
Examining data/pybluez-0.23/widcomm/inquirer.hpp
Examining data/pybluez-0.23/widcomm/l2capconn.cpp
Examining data/pybluez-0.23/widcomm/l2capconn.hpp
Examining data/pybluez-0.23/widcomm/l2capif.cpp
Examining data/pybluez-0.23/widcomm/l2capif.hpp
Examining data/pybluez-0.23/widcomm/rfcommif.cpp
Examining data/pybluez-0.23/widcomm/rfcommport.cpp
Examining data/pybluez-0.23/widcomm/rfcommport.hpp
Examining data/pybluez-0.23/widcomm/sdpservice.cpp
Examining data/pybluez-0.23/widcomm/util.cpp
Examining data/pybluez-0.23/widcomm/util.h

FINAL RESULTS:

data/pybluez-0.23/msbt/_msbt.c:24:5:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vprintf (fmt, ap);
data/pybluez-0.23/widcomm/inquirer.cpp:18:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf (stderr, fmt, ap);
data/pybluez-0.23/widcomm/l2capconn.cpp:18:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf (stderr, fmt, ap);
data/pybluez-0.23/widcomm/l2capif.cpp:21:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf (stderr, fmt, ap);
data/pybluez-0.23/widcomm/rfcommport.cpp:17:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf (stderr, fmt, ap);
data/pybluez-0.23/bluez/btmodule.c:210:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char ba_name[18];
data/pybluez-0.23/bluez/btmodule.c:498:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[9] = { 0 };
data/pybluez-0.23/bluez/btmodule.c:561:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(dest, "%04X", uuid->value.uuid16 );
data/pybluez-0.23/bluez/btmodule.c:563:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(dest, "%08X", uuid->value.uuid32 );
data/pybluez-0.23/bluez/btmodule.c:566:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(dest, "%08X-%04X-%04X-%04X-%04X%08X",
data/pybluez-0.23/bluez/btmodule.c:583:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char addrbuf[256];
data/pybluez-0.23/bluez/btmodule.c:1043:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char addrbuf[256];
data/pybluez-0.23/bluez/btmodule.c:1069:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char addrbuf[256];
data/pybluez-0.23/bluez/btmodule.c:1223:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char addrbuf[256];
data/pybluez-0.23/bluez/btmodule.c:1529:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[512];
data/pybluez-0.23/bluez/btmodule.c:2038:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char rparam[256];
data/pybluez-0.23/bluez/btmodule.c:2085:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ba_name[19];
data/pybluez-0.23/bluez/btmodule.c:2089:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[sizeof(*ir) + sizeof(inquiry_info) * 250];
data/pybluez-0.23/bluez/btmodule.c:2190:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char name[249];
data/pybluez-0.23/bluez/btmodule.c:2368:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ba_str[19] = {0};
data/pybluez-0.23/bluez/btmodule.c:2524:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[sizeof(struct hci_conn_info_req) + sizeof(struct hci_conn_info)];
data/pybluez-0.23/bluez/btmodule.c:2585:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char addrbuf[256] = { 0 };
data/pybluez-0.23/bluez/btmodule.c:3720:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *event_str[EVENT_NUM + 1] = {
data/pybluez-0.23/bluez/btmodule.c:3802:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *cmd_linkctl_str[CMD_LINKCTL_NUM + 1] = {
data/pybluez-0.23/bluez/btmodule.c:3867:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *cmd_linkpol_str[CMD_LINKPOL_NUM + 1] = {
data/pybluez-0.23/bluez/btmodule.c:3889:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *cmd_hostctl_str[CMD_HOSTCTL_NUM + 1] = {
data/pybluez-0.23/bluez/btmodule.c:4003:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *cmd_info_str[CMD_INFO_NUM + 1] = {
data/pybluez-0.23/bluez/btmodule.c:4018:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *cmd_status_str[CMD_STATUS_NUM + 1] = {
data/pybluez-0.23/bluez/btmodule.c:4034:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *cmd_testing_str[CMD_TESTING_NUM + 1] = {
data/pybluez-0.23/bluez/btmodule.c:4043:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *cmd_le_str[CMD_LE_NUM + 1] = {
data/pybluez-0.23/bluez/btsdp.c:66:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024] = { 0 };
data/pybluez-0.23/bluez/btsdp.c:177:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char uuid_str[40] = { 0 };
data/pybluez-0.23/bluez/btsdp.c:194:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char uuid_str[40] = { 0 };
data/pybluez-0.23/bluez/btsdp.c:399:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[512];
data/pybluez-0.23/msbt/_msbt.c:47:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char bytes[6];
data/pybluez-0.23/msbt/_msbt.c:108:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[20] = { 0 };
data/pybluez-0.23/msbt/_msbt.c:125:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf2[3] = { buf[2*i], buf[2*i+1], 0 };
data/pybluez-0.23/msbt/_msbt.c:161:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100] = { 0 };
data/pybluez-0.23/msbt/_msbt.c:216:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100] = { 0 };
data/pybluez-0.23/msbt/_msbt.c:333:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[18] = { 0 };
data/pybluez-0.23/msbt/_msbt.c:365:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[18] = { 0 };
data/pybluez-0.23/msbt/_msbt.c:473:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[40] = {0};
data/pybluez-0.23/msbt/_msbt.c:519:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[40] = {0};
data/pybluez-0.23/msbt/_msbt.c:597:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localAddressBuf[20] = { 0 };
data/pybluez-0.23/msbt/_msbt.c:789:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( si->pRecord, record, reclen );
data/pybluez-0.23/widcomm/inquirer.cpp:122:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char bda[6];
data/pybluez-0.23/widcomm/inquirer.cpp:123:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char devClass[3];
data/pybluez-0.23/widcomm/inquirer.cpp:124:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char bdName[248];
data/pybluez-0.23/widcomm/inquirer.cpp:137:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (msg.bda, bda, BD_ADDR_LEN);
data/pybluez-0.23/widcomm/inquirer.cpp:138:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (msg.devClass, devClass, sizeof (devClass));
data/pybluez-0.23/widcomm/inquirer.cpp:139:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (msg.bdName, bdName, strlen ((char*)bdName));
data/pybluez-0.23/widcomm/inquirer.cpp:265:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (bdaddr, bdaddr_in, BD_ADDR_LEN);
data/pybluez-0.23/widcomm/inquirer.cpp:352:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (bdaddr, bdaddr_in, BD_ADDR_LEN);
data/pybluez-0.23/widcomm/inquirer.cpp:375:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char bdaddr_str[18];
data/pybluez-0.23/widcomm/inquirer.cpp:493:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAX_PATH];
data/pybluez-0.23/widcomm/l2capconn.cpp:232:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (bdaddr, bdaddr_in, BD_ADDR_LEN);
data/pybluez-0.23/widcomm/rfcommport.cpp:179:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (bdaddr, bdaddr_in, BD_ADDR_LEN);
data/pybluez-0.23/widcomm/util.cpp:12:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[20] = { 0 };
data/pybluez-0.23/widcomm/util.cpp:29:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf2[3] = { buf[2*i], buf[2*i+1], 0 };
data/pybluez-0.23/bluez/btmodule.c:496:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if( strlen( uuid_str ) == 36 ) {
data/pybluez-0.23/bluez/btmodule.c:505:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(buf, uuid_str, 8);
data/pybluez-0.23/bluez/btmodule.c:510:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(buf, uuid_str+9, 4);
data/pybluez-0.23/bluez/btmodule.c:511:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(buf+4, uuid_str+14, 4);
data/pybluez-0.23/bluez/btmodule.c:516:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(buf, uuid_str+19, 4);
data/pybluez-0.23/bluez/btmodule.c:517:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(buf+4, uuid_str+24, 4);
data/pybluez-0.23/bluez/btmodule.c:522:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(buf, uuid_str+28, 8);
data/pybluez-0.23/bluez/btmodule.c:527:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } else if ( strlen( uuid_str ) == 8 ) {
data/pybluez-0.23/bluez/btmodule.c:532:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } else if( strlen( uuid_str ) == 4 ) {
data/pybluez-0.23/bluez/btmodule.c:2496:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(addr && strlen(addr)) {
data/pybluez-0.23/bluez/btmodule.c:2624:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if( strlen(service_id_str) && ! str2uuid( service_id_str, &svc_uuid ) ) {
data/pybluez-0.23/bluez/btmodule.c:2806:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if( strlen(service_id_str) ) sdp_set_service_id( &record, svc_uuid );
data/pybluez-0.23/msbt/_msbt.c:482:17:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                wcslen(device_info.szName));
data/pybluez-0.23/msbt/_msbt.c:574:50:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return PyUnicode_FromWideChar( dinfo.szName, wcslen( dinfo.szName ) );
data/pybluez-0.23/msbt/_msbt.c:654:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if( strlen(uuidstr) != 36 || uuidstr[8] != '-' || uuidstr[13] != '-' 
data/pybluez-0.23/widcomm/inquirer.cpp:139:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    memcpy (msg.bdName, bdName, strlen ((char*)bdName));

ANALYSIS SUMMARY:

Hits = 75
Lines analyzed = 9780 in approximately 0.27 seconds (35615 lines/second)
Physical Source Lines of Code (SLOC) = 6757
Hits@level = [0]   6 [1]  16 [2]  54 [3]   0 [4]   5 [5]   0
Hits@level+ = [0+]  81 [1+]  75 [2+]  59 [3+]   5 [4+]   5 [5+]   0
Hits/KSLOC@level+ = [0+] 11.9876 [1+] 11.0996 [2+] 8.73169 [3+] 0.739973 [4+] 0.739973 [5+]   0
Dot directories skipped = 2 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.