Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/r-cran-pcict-0.5-4.1/src/strptime_360.h
Examining data/r-cran-pcict-0.5-4.1/src/datetime_360.c

FINAL RESULTS:

data/r-cran-pcict-0.5-4.1/src/datetime_360.c:694:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		    strcat(buf2, tzname[0]);
data/r-cran-pcict-0.5-4.1/src/datetime_360.c:695:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		    strcat(buf2, p+2);
data/r-cran-pcict-0.5-4.1/src/datetime_360.c:698:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		    strcpy(buf2, q);
data/r-cran-pcict-0.5-4.1/src/datetime_360.c:718:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(buf2, p+nused);
data/r-cran-pcict-0.5-4.1/src/datetime_360.c:721:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(buf2, p+nused);
data/r-cran-pcict-0.5-4.1/src/strptime_360.h:1177:22:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if(strlen(buff)) strcpy(am_pm[0], buff);
data/r-cran-pcict-0.5-4.1/src/strptime_360.h:1180:22:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if(strlen(buff)) strcpy(am_pm[1], buff);
data/r-cran-pcict-0.5-4.1/src/strptime_360.h:1209:22:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    if(wcslen(buff)) wcscpy(w_am_pm[0], buff);
data/r-cran-pcict-0.5-4.1/src/strptime_360.h:1212:22:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    if(wcslen(buff)) wcscpy(w_am_pm[1], buff);
data/r-cran-pcict-0.5-4.1/src/datetime_360.c:311:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&oldtm, tm, sizeof(struct tm));
data/r-cran-pcict-0.5-4.1/src/datetime_360.c:316:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tm, &oldtm, sizeof(struct tm));
data/r-cran-pcict-0.5-4.1/src/datetime_360.c:373:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tm, &oldtm, sizeof(struct tm));
data/r-cran-pcict-0.5-4.1/src/datetime_360.c:502:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char *Rtzname[2];
data/r-cran-pcict-0.5-4.1/src/datetime_360.c:504:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern __declspec(dllimport) char *tzname[2];
data/r-cran-pcict-0.5-4.1/src/datetime_360.c:506:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char *tzname[2];
data/r-cran-pcict-0.5-4.1/src/datetime_360.c:638:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buff[300];
data/r-cran-pcict-0.5-4.1/src/datetime_360.c:687:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf2[n];
data/r-cran-pcict-0.5-4.1/src/datetime_360.c:717:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(p2, "%0*.*f", ns+3, ns, s);
data/r-cran-pcict-0.5-4.1/src/datetime_360.c:720:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(p2, "%S");
data/r-cran-pcict-0.5-4.1/src/datetime_360.c:818:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&tm2, &tm, sizeof(struct tm));
data/r-cran-pcict-0.5-4.1/src/datetime_360.c:827:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&tm2, &tm, sizeof(struct tm));
data/r-cran-pcict-0.5-4.1/src/strptime_360.h:1156:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buff[4];
data/r-cran-pcict-0.5-4.1/src/strptime_360.h:1188:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t buff[4];
data/r-cran-pcict-0.5-4.1/src/strptime_360.h:1227:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t wbuf[1001], wfmt[1001]; size_t n;
data/r-cran-pcict-0.5-4.1/src/datetime_360.c:686:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int n = (int) strlen(q) + 50;
data/r-cran-pcict-0.5-4.1/src/datetime_360.c:693:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		    strncpy(buf2, q, p - q);
data/r-cran-pcict-0.5-4.1/src/strptime_360.h:66:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  (__extension__ ({ size_t len = strlen (cs1);						      \
data/r-cran-pcict-0.5-4.1/src/strptime_360.h:73:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  (strncasecmp ((cs1), (s2), strlen (cs1)) ? 0 : ((s2) += strlen (cs1), 1))
data/r-cran-pcict-0.5-4.1/src/strptime_360.h:73:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  (strncasecmp ((cs1), (s2), strlen (cs1)) ? 0 : ((s2) += strlen (cs1), 1))
data/r-cran-pcict-0.5-4.1/src/strptime_360.h:205:19:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t i, n = wcslen(cs1);
data/r-cran-pcict-0.5-4.1/src/strptime_360.h:214:46:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  (Rwcsncasecmp ((cs1), (s2)) ? 0 : ((s2) += wcslen (cs1), 1))
data/r-cran-pcict-0.5-4.1/src/strptime_360.h:1177:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(strlen(buff)) strcpy(am_pm[0], buff);
data/r-cran-pcict-0.5-4.1/src/strptime_360.h:1180:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(strlen(buff)) strcpy(am_pm[1], buff);
data/r-cran-pcict-0.5-4.1/src/strptime_360.h:1209:8:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(wcslen(buff)) wcscpy(w_am_pm[0], buff);
data/r-cran-pcict-0.5-4.1/src/strptime_360.h:1212:8:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(wcslen(buff)) wcscpy(w_am_pm[1], buff);

ANALYSIS SUMMARY:

Hits = 35
Lines analyzed = 2219 in approximately 0.08 seconds (28741 lines/second)
Physical Source Lines of Code (SLOC) = 1678
Hits@level = [0]   0 [1]  11 [2]  15 [3]   0 [4]   9 [5]   0
Hits@level+ = [0+]  35 [1+]  35 [2+]  24 [3+]   9 [4+]   9 [5+]   0
Hits/KSLOC@level+ = [0+] 20.8582 [1+] 20.8582 [2+] 14.3027 [3+] 5.36353 [4+] 5.36353 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.