Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/APR/Request/APR__Request.h
Examining data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/APR/Request/Apache2/APR__Request__Apache2.h
Examining data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/APR/Request/Cookie/APR__Request__Cookie.h
Examining data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/APR/Request/Error/APR__Request__Error.h
Examining data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/APR/Request/Param/APR__Request__Param.h
Examining data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/apreq_xs_postperl.h
Examining data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/apreq_xs_preperl.h
Examining data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/apreq_xs_tables.h
Examining data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/ppport.h
Examining data/rapache-1.2.8/libapreq2/include/apreq.h
Examining data/rapache-1.2.8/libapreq2/include/apreq_cookie.h
Examining data/rapache-1.2.8/libapreq2/include/apreq_error.h
Examining data/rapache-1.2.8/libapreq2/include/apreq_module.h
Examining data/rapache-1.2.8/libapreq2/include/apreq_param.h
Examining data/rapache-1.2.8/libapreq2/include/apreq_parser.h
Examining data/rapache-1.2.8/libapreq2/include/apreq_util.h
Examining data/rapache-1.2.8/libapreq2/include/apreq_version.h
Examining data/rapache-1.2.8/libapreq2/library/cookie.c
Examining data/rapache-1.2.8/libapreq2/library/error.c
Examining data/rapache-1.2.8/libapreq2/library/module.c
Examining data/rapache-1.2.8/libapreq2/library/module_cgi.c
Examining data/rapache-1.2.8/libapreq2/library/module_custom.c
Examining data/rapache-1.2.8/libapreq2/library/param.c
Examining data/rapache-1.2.8/libapreq2/library/parser.c
Examining data/rapache-1.2.8/libapreq2/library/parser_header.c
Examining data/rapache-1.2.8/libapreq2/library/parser_multipart.c
Examining data/rapache-1.2.8/libapreq2/library/parser_urlencoded.c
Examining data/rapache-1.2.8/libapreq2/library/t/at.c
Examining data/rapache-1.2.8/libapreq2/library/t/at.h
Examining data/rapache-1.2.8/libapreq2/library/t/cookie.c
Examining data/rapache-1.2.8/libapreq2/library/t/error.c
Examining data/rapache-1.2.8/libapreq2/library/t/params.c
Examining data/rapache-1.2.8/libapreq2/library/t/parsers.c
Examining data/rapache-1.2.8/libapreq2/library/t/util.c
Examining data/rapache-1.2.8/libapreq2/library/t/version.c
Examining data/rapache-1.2.8/libapreq2/library/util.c
Examining data/rapache-1.2.8/libapreq2/library/version.c
Examining data/rapache-1.2.8/libapreq2/module/apache/apreq_module_apache.h
Examining data/rapache-1.2.8/libapreq2/module/apache/apreq_private_apache.h
Examining data/rapache-1.2.8/libapreq2/module/apache/command.c
Examining data/rapache-1.2.8/libapreq2/module/apache/handle.c
Examining data/rapache-1.2.8/libapreq2/module/apache/t/c-modules/apreq_access_test/mod_apreq_access_test.c
Examining data/rapache-1.2.8/libapreq2/module/apache/t/c-modules/apreq_big_request_test/mod_apreq_big_request_test.c
Examining data/rapache-1.2.8/libapreq2/module/apache/t/c-modules/apreq_cookie_test/mod_apreq_cookie_test.c
Examining data/rapache-1.2.8/libapreq2/module/apache/t/c-modules/apreq_redirect_test/mod_apreq_redirect_test.c
Examining data/rapache-1.2.8/libapreq2/module/apache/t/c-modules/apreq_request_test/mod_apreq_request_test.c
Examining data/rapache-1.2.8/libapreq2/module/apache2/apreq_module_apache2.h
Examining data/rapache-1.2.8/libapreq2/module/apache2/apreq_private_apache2.h
Examining data/rapache-1.2.8/libapreq2/module/apache2/filter.c
Examining data/rapache-1.2.8/libapreq2/module/apache2/handle.c
Examining data/rapache-1.2.8/libapreq2/module/t/c-modules/apreq_access_test/mod_apreq_access_test.c
Examining data/rapache-1.2.8/libapreq2/module/t/c-modules/apreq_big_request_test/mod_apreq_big_request_test.c
Examining data/rapache-1.2.8/libapreq2/module/t/c-modules/apreq_cookie_test/mod_apreq_cookie_test.c
Examining data/rapache-1.2.8/libapreq2/module/t/c-modules/apreq_output_filter_test/mod_apreq_output_filter_test.c
Examining data/rapache-1.2.8/libapreq2/module/t/c-modules/apreq_redirect_test/mod_apreq_redirect_test.c
Examining data/rapache-1.2.8/libapreq2/module/t/c-modules/apreq_request_test/mod_apreq_request_test.c
Examining data/rapache-1.2.8/libapreq2/module/test_cgi.c
Examining data/rapache-1.2.8/mod_R.c

FINAL RESULTS:

data/rapache-1.2.8/libapreq2/library/cookie.c:445:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(f, c->max_age != -1 ? "; max-age=%" APR_TIME_T_FMT : "");
data/rapache-1.2.8/mod_R.c:1241:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(text,"%s('%s')",fun,arg);
data/rapache-1.2.8/mod_R.c:1310:10:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
         sprintf(text,fmt4,h->directive->package,h->directive->function,
data/rapache-1.2.8/mod_R.c:1315:10:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
         sprintf(text,fmt3,h->directive->function,r->filename);
data/rapache-1.2.8/mod_R.c:1331:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(text,fmt2,h->directive->package,h->directive->function);
data/rapache-1.2.8/mod_R.c:1338:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(text,fmt1,h->directive->function);
data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/APR/Request/Param/APR__Request__Param.h:323:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, data, dlen);
data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/apreq_xs_postperl.h:169:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/rapache-1.2.8/libapreq2/include/apreq.h:111:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char              data[1]; /**< value data  */
data/rapache-1.2.8/libapreq2/library/cookie.c:143:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(v->data, value, vlen);
data/rapache-1.2.8/libapreq2/library/cookie.c:148:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(v->name, name, nlen);
data/rapache-1.2.8/libapreq2/library/cookie.c:379:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char format[128] = "%s=%s";
data/rapache-1.2.8/libapreq2/library/cookie.c:391:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char expires[APR_RFC822_DATE_LEN] = {0};
data/rapache-1.2.8/libapreq2/library/cookie.c:395:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(f, "; " #name "=%s");            \
data/rapache-1.2.8/libapreq2/library/cookie.c:397:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(f, "%0.s");                      \
data/rapache-1.2.8/libapreq2/library/cookie.c:405:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(f, "; expires=%s");
data/rapache-1.2.8/libapreq2/library/cookie.c:416:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(f, "; secure");
data/rapache-1.2.8/libapreq2/library/cookie.c:424:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(f,"; Version=%u");
data/rapache-1.2.8/libapreq2/library/cookie.c:431:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(f, "; " #name "=%s");        \
data/rapache-1.2.8/libapreq2/library/cookie.c:433:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(f, "; " #name "=\"%s\"");    \
data/rapache-1.2.8/libapreq2/library/cookie.c:435:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(f, "%0.s");                      \
data/rapache-1.2.8/libapreq2/library/cookie.c:450:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(f, "; secure");
data/rapache-1.2.8/libapreq2/library/module_cgi.c:117:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/rapache-1.2.8/libapreq2/library/module_cgi.c:121:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char date[APR_CTIME_LEN];
data/rapache-1.2.8/libapreq2/library/param.c:49:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(v->data, val, vlen);
data/rapache-1.2.8/libapreq2/library/param.c:55:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(v->name, name, nlen);
data/rapache-1.2.8/libapreq2/library/parser_header.c:116:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dest, data, dlen);
data/rapache-1.2.8/libapreq2/library/parser_header.c:136:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dest, iov->iov_base, iov->iov_len);
data/rapache-1.2.8/libapreq2/library/t/at.c:28:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[32];
data/rapache-1.2.8/libapreq2/library/t/at.c:51:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256], *b = buf + 2;
data/rapache-1.2.8/libapreq2/library/t/at.c:100:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/rapache-1.2.8/libapreq2/library/t/at.c:209:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char label[32];
data/rapache-1.2.8/libapreq2/library/t/at.c:223:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/rapache-1.2.8/libapreq2/library/t/at.h:151:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char format[32] = "testing: %s (%s:%d)";
data/rapache-1.2.8/libapreq2/library/t/at.h:157:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(format, "   left:", 8);
data/rapache-1.2.8/libapreq2/library/t/at.h:159:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(format, "  right:", 8);
data/rapache-1.2.8/libapreq2/library/t/at.h:172:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256] = #a " != " #b;                                       \
data/rapache-1.2.8/libapreq2/library/t/at.h:184:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256] = #a " == " #b;                                       \
data/rapache-1.2.8/libapreq2/library/t/at.h:248:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/rapache-1.2.8/libapreq2/library/t/cookie.c:79:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char expires[APR_RFC822_DATE_LEN];
data/rapache-1.2.8/libapreq2/library/t/error.c:24:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256], *str;
data/rapache-1.2.8/libapreq2/library/t/params.c:79:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(s1, "bend it like beckham");
data/rapache-1.2.8/libapreq2/library/t/params.c:80:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(s2, "dandy %3Edons");
data/rapache-1.2.8/libapreq2/library/t/params.c:146:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(name, "foo");
data/rapache-1.2.8/libapreq2/library/t/params.c:147:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(val, "bar > alpha");
data/rapache-1.2.8/libapreq2/library/t/util.c:77:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char expect[6];
data/rapache-1.2.8/libapreq2/library/t/util.c:105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dest[sizeof(src1) + sizeof(src2) + sizeof(src3)];
data/rapache-1.2.8/libapreq2/library/t/util.c:129:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char src2[5];
data/rapache-1.2.8/libapreq2/library/t/util.c:130:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char expect[16];
data/rapache-1.2.8/libapreq2/library/t/util.c:166:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dst[64];
data/rapache-1.2.8/libapreq2/library/t/util.c:188:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dst[64];
data/rapache-1.2.8/libapreq2/library/util.c:123:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char xstr[5];
data/rapache-1.2.8/libapreq2/library/util.c:288:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char xstr[7];
data/rapache-1.2.8/libapreq2/library/util.c:628:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(d + len, v[n].iov_base, v[n].iov_len);
data/rapache-1.2.8/libapreq2/library/util.c:696:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dest, src, slen);
data/rapache-1.2.8/libapreq2/library/util.c:788:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(d, sep, slen);
data/rapache-1.2.8/libapreq2/library/util.c:801:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(d, sep, slen);
data/rapache-1.2.8/libapreq2/library/util.c:816:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(d, sep, slen);
data/rapache-1.2.8/libapreq2/library/util.c:824:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(d,a[0]->data, a[0]->dlen);
data/rapache-1.2.8/libapreq2/library/util.c:828:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(d, sep, slen);
data/rapache-1.2.8/libapreq2/library/util.c:830:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(d, a[j]->data, a[j]->dlen);
data/rapache-1.2.8/libapreq2/library/util.c:872:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        v[n].iov_base = (char *)(v[n].iov_base) + len;
data/rapache-1.2.8/libapreq2/module/apache/handle.c:153:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[HUGE_STRING_LEN];
data/rapache-1.2.8/mod_R.c:376:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(c,n,sizeof(RApacheDirective));
data/rapache-1.2.8/mod_R.c:401:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(c,n,sizeof(RApacheDirective));
data/rapache-1.2.8/mod_R.c:1803:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char strExpires[APR_RFC822_DATE_LEN];
data/rapache-1.2.8/mod_R.c:2290:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(buf, INTEGER(object), size * len);
data/rapache-1.2.8/mod_R.c:2298:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(buf + j, &l1, size);
data/rapache-1.2.8/mod_R.c:2308:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(buf + j, &ll1, size);
data/rapache-1.2.8/mod_R.c:2318:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(buf + j, &s1, size);
data/rapache-1.2.8/mod_R.c:2333:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(buf, REAL(object), size * len);
data/rapache-1.2.8/mod_R.c:2340:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(buf+j, &f1, size);
data/rapache-1.2.8/mod_R.c:2353:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(buf+j, &ld1, size);
data/rapache-1.2.8/mod_R.c:2363:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, COMPLEX(object), size * len);
data/rapache-1.2.8/mod_R.c:2366:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buf, RAW(object), len); /* size = 1 */
data/rapache-1.2.8/mod_R.c:2450:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   if (len > 0) memcpy(RAW(ans),buf,len);
data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/apreq_xs_postperl.h:175:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sv_setpvn(sv, buf, strlen(buf));
data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/apreq_xs_postperl.h:241:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    HV *stash = gv_stashpvn(class, strlen(class), FALSE);
data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/ppport.h:724:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        STRLEN len = strlen(radix);
data/rapache-1.2.8/libapreq2/include/apreq_util.h:212:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    apr_status_t rv = apreq_decode(str, &len, str, strlen(str));
data/rapache-1.2.8/libapreq2/library/cookie.c:380:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *f = format + strlen(format);
data/rapache-1.2.8/libapreq2/library/cookie.c:398:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    f += strlen(f);                             \
data/rapache-1.2.8/libapreq2/library/cookie.c:411:13:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
            strcpy(f, "");
data/rapache-1.2.8/libapreq2/library/cookie.c:413:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        f += strlen(f);
data/rapache-1.2.8/libapreq2/library/cookie.c:425:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    f += strlen(f);
data/rapache-1.2.8/libapreq2/library/cookie.c:436:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    f += strlen (f);                            \
data/rapache-1.2.8/libapreq2/library/cookie.c:447:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    f += strlen(f);
data/rapache-1.2.8/libapreq2/library/parser.c:228:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                      "_dummy_", strlen("_dummy_"), "", 0);
data/rapache-1.2.8/libapreq2/library/parser_multipart.c:72:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    apr_size_t slen = strlen(start_string);
data/rapache-1.2.8/libapreq2/library/parser_multipart.c:115:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    apr_size_t blen = strlen(bdry), off = 0;
data/rapache-1.2.8/libapreq2/library/parser_multipart.c:440:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        nlen = strlen(name);
data/rapache-1.2.8/libapreq2/library/parser_multipart.c:462:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                nlen = strlen(name);
data/rapache-1.2.8/libapreq2/library/parser_multipart.c:503:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                         strlen(ctx->param_name), NULL, len);
data/rapache-1.2.8/libapreq2/library/t/at.c:168:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    apr_size_t len = strlen(msg);
data/rapache-1.2.8/libapreq2/library/t/parsers.c:153:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        apr_bucket_immortal_create(url_data,strlen(url_data), 
data/rapache-1.2.8/libapreq2/library/t/parsers.c:180:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (j = 0; j <= strlen(form_data); ++j) {
data/rapache-1.2.8/libapreq2/library/t/parsers.c:192:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        for (i = 0; i <= strlen(form_data); ++i) {
data/rapache-1.2.8/libapreq2/library/t/parsers.c:211:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                           strlen(form_data),
data/rapache-1.2.8/libapreq2/library/t/parsers.c:226:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            AT_int_eq(rv, (j < strlen(form_data)) ? APR_INCOMPLETE : APR_SUCCESS);
data/rapache-1.2.8/libapreq2/library/t/parsers.c:242:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            AT_int_eq(len, strlen("... contents of file1.txt ..." CRLF));
data/rapache-1.2.8/libapreq2/library/t/parsers.c:271:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    e = apr_bucket_immortal_create(form_data, strlen(form_data), ba);
data/rapache-1.2.8/libapreq2/library/t/parsers.c:311:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                               strlen(xml_data),
data/rapache-1.2.8/libapreq2/library/t/parsers.c:328:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    AT_int_eq(vlen, strlen(xml_data));
data/rapache-1.2.8/libapreq2/library/t/parsers.c:342:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                               strlen(xml_data),
data/rapache-1.2.8/libapreq2/library/t/parsers.c:369:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int dlen = strlen(data);
data/rapache-1.2.8/libapreq2/library/t/parsers.c:383:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                   strlen(rel_data),
data/rapache-1.2.8/libapreq2/library/t/parsers.c:457:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                   strlen(mix_data),
data/rapache-1.2.8/libapreq2/library/t/parsers.c:483:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    AT_int_eq(vlen, strlen("... contents of file1.txt ..."));
data/rapache-1.2.8/libapreq2/library/t/parsers.c:496:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    AT_int_eq(vlen, strlen("...contents of file2.gif..."));
data/rapache-1.2.8/libapreq2/library/util.c:753:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    slen = sep ? strlen(sep) : 0;
data/rapache-1.2.8/libapreq2/library/util.c:1106:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return apr_bucket_type_file.read(e, str, len, block);
data/rapache-1.2.8/libapreq2/module/apache/t/c-modules/apreq_big_request_test/mod_apreq_big_request_test.c:36:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *c = *c + strlen(key) + strlen(value);
data/rapache-1.2.8/libapreq2/module/apache/t/c-modules/apreq_big_request_test/mod_apreq_big_request_test.c:36:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *c = *c + strlen(key) + strlen(value);
data/rapache-1.2.8/libapreq2/module/apache/t/c-modules/apreq_cookie_test/mod_apreq_cookie_test.c:83:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size = strlen(cookie->v.data);
data/rapache-1.2.8/libapreq2/module/t/c-modules/apreq_big_request_test/mod_apreq_big_request_test.c:36:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *c = *c + strlen(key) + strlen(value);
data/rapache-1.2.8/libapreq2/module/t/c-modules/apreq_big_request_test/mod_apreq_big_request_test.c:36:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *c = *c + strlen(key) + strlen(value);
data/rapache-1.2.8/libapreq2/module/t/c-modules/apreq_cookie_test/mod_apreq_cookie_test.c:83:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size = strlen(cookie->v.data);
data/rapache-1.2.8/libapreq2/module/test_cgi.c:29:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        *c += strlen(key) + value_len;
data/rapache-1.2.8/mod_R.c:728:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   (ptr_R_WriteConsoleEx)(s,strlen(s),1);
data/rapache-1.2.8/mod_R.c:1240:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   text = Calloc(strlen(fun)+strlen(arg)+5,char);
data/rapache-1.2.8/mod_R.c:1240:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   text = Calloc(strlen(fun)+strlen(arg)+5,char);
data/rapache-1.2.8/mod_R.c:1307:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         text = Calloc(strlen(fmt4)+strlen(h->directive->package)+
data/rapache-1.2.8/mod_R.c:1307:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         text = Calloc(strlen(fmt4)+strlen(h->directive->package)+
data/rapache-1.2.8/mod_R.c:1308:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(h->directive->function)+
data/rapache-1.2.8/mod_R.c:1309:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(r->filename),char);
data/rapache-1.2.8/mod_R.c:1313:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         text = Calloc(strlen(fmt3)+strlen(h->directive->function)+
data/rapache-1.2.8/mod_R.c:1313:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         text = Calloc(strlen(fmt3)+strlen(h->directive->function)+
data/rapache-1.2.8/mod_R.c:1314:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               strlen(r->filename),char);
data/rapache-1.2.8/mod_R.c:1330:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            text = Calloc(strlen(fmt2)+strlen(h->directive->package)+strlen(h->directive->function),char);
data/rapache-1.2.8/mod_R.c:1330:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            text = Calloc(strlen(fmt2)+strlen(h->directive->package)+strlen(h->directive->function),char);
data/rapache-1.2.8/mod_R.c:1330:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            text = Calloc(strlen(fmt2)+strlen(h->directive->package)+strlen(h->directive->function),char);
data/rapache-1.2.8/mod_R.c:1337:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            text = Calloc(strlen(fmt1)+strlen(h->directive->function),char);
data/rapache-1.2.8/mod_R.c:1337:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            text = Calloc(strlen(fmt1)+strlen(h->directive->function),char);
data/rapache-1.2.8/mod_R.c:1679:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   nlen = strlen(n);
data/rapache-1.2.8/mod_R.c:1684:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       if (strlen(s) == (nlen-2) && strncmp(s, n, nlen-2) == 0) {
data/rapache-1.2.8/mod_R.c:1861:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(str);
data/rapache-1.2.8/mod_R.c:1880:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(str);
data/rapache-1.2.8/mod_R.c:2233:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if (apr_brigade_write(MR_BBout,NULL,NULL,s,strlen(s)) != APR_SUCCESS) {

ANALYSIS SUMMARY:

Hits = 138
Lines analyzed = 16937 in approximately 0.46 seconds (36723 lines/second)
Physical Source Lines of Code (SLOC) = 11250
Hits@level = [0]  32 [1]  62 [2]  70 [3]   0 [4]   6 [5]   0
Hits@level+ = [0+] 170 [1+] 138 [2+]  76 [3+]   6 [4+]   6 [5+]   0
Hits/KSLOC@level+ = [0+] 15.1111 [1+] 12.2667 [2+] 6.75556 [3+] 0.533333 [4+] 0.533333 [5+]   0
Dot directories skipped = 3 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.