Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/APR/Request/APR__Request.h Examining data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/APR/Request/Apache2/APR__Request__Apache2.h Examining data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/APR/Request/Cookie/APR__Request__Cookie.h Examining data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/APR/Request/Error/APR__Request__Error.h Examining data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/APR/Request/Param/APR__Request__Param.h Examining data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/apreq_xs_postperl.h Examining data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/apreq_xs_preperl.h Examining data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/apreq_xs_tables.h Examining data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/ppport.h Examining data/rapache-1.2.8/libapreq2/include/apreq.h Examining data/rapache-1.2.8/libapreq2/include/apreq_cookie.h Examining data/rapache-1.2.8/libapreq2/include/apreq_error.h Examining data/rapache-1.2.8/libapreq2/include/apreq_module.h Examining data/rapache-1.2.8/libapreq2/include/apreq_param.h Examining data/rapache-1.2.8/libapreq2/include/apreq_parser.h Examining data/rapache-1.2.8/libapreq2/include/apreq_util.h Examining data/rapache-1.2.8/libapreq2/include/apreq_version.h Examining data/rapache-1.2.8/libapreq2/library/cookie.c Examining data/rapache-1.2.8/libapreq2/library/error.c Examining data/rapache-1.2.8/libapreq2/library/module.c Examining data/rapache-1.2.8/libapreq2/library/module_cgi.c Examining data/rapache-1.2.8/libapreq2/library/module_custom.c Examining data/rapache-1.2.8/libapreq2/library/param.c Examining data/rapache-1.2.8/libapreq2/library/parser.c Examining data/rapache-1.2.8/libapreq2/library/parser_header.c Examining data/rapache-1.2.8/libapreq2/library/parser_multipart.c Examining data/rapache-1.2.8/libapreq2/library/parser_urlencoded.c Examining data/rapache-1.2.8/libapreq2/library/t/at.c Examining data/rapache-1.2.8/libapreq2/library/t/at.h Examining data/rapache-1.2.8/libapreq2/library/t/cookie.c Examining data/rapache-1.2.8/libapreq2/library/t/error.c Examining data/rapache-1.2.8/libapreq2/library/t/params.c Examining data/rapache-1.2.8/libapreq2/library/t/parsers.c Examining data/rapache-1.2.8/libapreq2/library/t/util.c Examining data/rapache-1.2.8/libapreq2/library/t/version.c Examining data/rapache-1.2.8/libapreq2/library/util.c Examining data/rapache-1.2.8/libapreq2/library/version.c Examining data/rapache-1.2.8/libapreq2/module/apache/apreq_module_apache.h Examining data/rapache-1.2.8/libapreq2/module/apache/apreq_private_apache.h Examining data/rapache-1.2.8/libapreq2/module/apache/command.c Examining data/rapache-1.2.8/libapreq2/module/apache/handle.c Examining data/rapache-1.2.8/libapreq2/module/apache/t/c-modules/apreq_access_test/mod_apreq_access_test.c Examining data/rapache-1.2.8/libapreq2/module/apache/t/c-modules/apreq_big_request_test/mod_apreq_big_request_test.c Examining data/rapache-1.2.8/libapreq2/module/apache/t/c-modules/apreq_cookie_test/mod_apreq_cookie_test.c Examining data/rapache-1.2.8/libapreq2/module/apache/t/c-modules/apreq_redirect_test/mod_apreq_redirect_test.c Examining data/rapache-1.2.8/libapreq2/module/apache/t/c-modules/apreq_request_test/mod_apreq_request_test.c Examining data/rapache-1.2.8/libapreq2/module/apache2/apreq_module_apache2.h Examining data/rapache-1.2.8/libapreq2/module/apache2/apreq_private_apache2.h Examining data/rapache-1.2.8/libapreq2/module/apache2/filter.c Examining data/rapache-1.2.8/libapreq2/module/apache2/handle.c Examining data/rapache-1.2.8/libapreq2/module/t/c-modules/apreq_access_test/mod_apreq_access_test.c Examining data/rapache-1.2.8/libapreq2/module/t/c-modules/apreq_big_request_test/mod_apreq_big_request_test.c Examining data/rapache-1.2.8/libapreq2/module/t/c-modules/apreq_cookie_test/mod_apreq_cookie_test.c Examining data/rapache-1.2.8/libapreq2/module/t/c-modules/apreq_output_filter_test/mod_apreq_output_filter_test.c Examining data/rapache-1.2.8/libapreq2/module/t/c-modules/apreq_redirect_test/mod_apreq_redirect_test.c Examining data/rapache-1.2.8/libapreq2/module/t/c-modules/apreq_request_test/mod_apreq_request_test.c Examining data/rapache-1.2.8/libapreq2/module/test_cgi.c Examining data/rapache-1.2.8/mod_R.c FINAL RESULTS: data/rapache-1.2.8/libapreq2/library/cookie.c:445:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(f, c->max_age != -1 ? "; max-age=%" APR_TIME_T_FMT : ""); data/rapache-1.2.8/mod_R.c:1241:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(text,"%s('%s')",fun,arg); data/rapache-1.2.8/mod_R.c:1310:10: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(text,fmt4,h->directive->package,h->directive->function, data/rapache-1.2.8/mod_R.c:1315:10: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(text,fmt3,h->directive->function,r->filename); data/rapache-1.2.8/mod_R.c:1331:13: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(text,fmt2,h->directive->package,h->directive->function); data/rapache-1.2.8/mod_R.c:1338:13: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(text,fmt1,h->directive->function); data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/APR/Request/Param/APR__Request__Param.h:323:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, data, dlen); data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/apreq_xs_postperl.h:169:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/rapache-1.2.8/libapreq2/include/apreq.h:111:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[1]; /**< value data */ data/rapache-1.2.8/libapreq2/library/cookie.c:143:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v->data, value, vlen); data/rapache-1.2.8/libapreq2/library/cookie.c:148:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v->name, name, nlen); data/rapache-1.2.8/libapreq2/library/cookie.c:379:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format[128] = "%s=%s"; data/rapache-1.2.8/libapreq2/library/cookie.c:391:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expires[APR_RFC822_DATE_LEN] = {0}; data/rapache-1.2.8/libapreq2/library/cookie.c:395:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(f, "; " #name "=%s"); \ data/rapache-1.2.8/libapreq2/library/cookie.c:397:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(f, "%0.s"); \ data/rapache-1.2.8/libapreq2/library/cookie.c:405:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(f, "; expires=%s"); data/rapache-1.2.8/libapreq2/library/cookie.c:416:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(f, "; secure"); data/rapache-1.2.8/libapreq2/library/cookie.c:424:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(f,"; Version=%u"); data/rapache-1.2.8/libapreq2/library/cookie.c:431:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(f, "; " #name "=%s"); \ data/rapache-1.2.8/libapreq2/library/cookie.c:433:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(f, "; " #name "=\"%s\""); \ data/rapache-1.2.8/libapreq2/library/cookie.c:435:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(f, "%0.s"); \ data/rapache-1.2.8/libapreq2/library/cookie.c:450:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(f, "; secure"); data/rapache-1.2.8/libapreq2/library/module_cgi.c:117:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/rapache-1.2.8/libapreq2/library/module_cgi.c:121:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char date[APR_CTIME_LEN]; data/rapache-1.2.8/libapreq2/library/param.c:49:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v->data, val, vlen); data/rapache-1.2.8/libapreq2/library/param.c:55:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(v->name, name, nlen); data/rapache-1.2.8/libapreq2/library/parser_header.c:116:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, data, dlen); data/rapache-1.2.8/libapreq2/library/parser_header.c:136:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, iov->iov_base, iov->iov_len); data/rapache-1.2.8/libapreq2/library/t/at.c:28:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/rapache-1.2.8/libapreq2/library/t/at.c:51:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256], *b = buf + 2; data/rapache-1.2.8/libapreq2/library/t/at.c:100:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/rapache-1.2.8/libapreq2/library/t/at.c:209:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[32]; data/rapache-1.2.8/libapreq2/library/t/at.c:223:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/rapache-1.2.8/libapreq2/library/t/at.h:151:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format[32] = "testing: %s (%s:%d)"; data/rapache-1.2.8/libapreq2/library/t/at.h:157:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(format, " left:", 8); data/rapache-1.2.8/libapreq2/library/t/at.h:159:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(format, " right:", 8); data/rapache-1.2.8/libapreq2/library/t/at.h:172:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256] = #a " != " #b; \ data/rapache-1.2.8/libapreq2/library/t/at.h:184:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256] = #a " == " #b; \ data/rapache-1.2.8/libapreq2/library/t/at.h:248:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/rapache-1.2.8/libapreq2/library/t/cookie.c:79:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expires[APR_RFC822_DATE_LEN]; data/rapache-1.2.8/libapreq2/library/t/error.c:24:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256], *str; data/rapache-1.2.8/libapreq2/library/t/params.c:79:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s1, "bend it like beckham"); data/rapache-1.2.8/libapreq2/library/t/params.c:80:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s2, "dandy %3Edons"); data/rapache-1.2.8/libapreq2/library/t/params.c:146:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(name, "foo"); data/rapache-1.2.8/libapreq2/library/t/params.c:147:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(val, "bar > alpha"); data/rapache-1.2.8/libapreq2/library/t/util.c:77:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char expect[6]; data/rapache-1.2.8/libapreq2/library/t/util.c:105:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dest[sizeof(src1) + sizeof(src2) + sizeof(src3)]; data/rapache-1.2.8/libapreq2/library/t/util.c:129:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char src2[5]; data/rapache-1.2.8/libapreq2/library/t/util.c:130:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char expect[16]; data/rapache-1.2.8/libapreq2/library/t/util.c:166:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dst[64]; data/rapache-1.2.8/libapreq2/library/t/util.c:188:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dst[64]; data/rapache-1.2.8/libapreq2/library/util.c:123:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char xstr[5]; data/rapache-1.2.8/libapreq2/library/util.c:288:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char xstr[7]; data/rapache-1.2.8/libapreq2/library/util.c:628:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d + len, v[n].iov_base, v[n].iov_len); data/rapache-1.2.8/libapreq2/library/util.c:696:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, src, slen); data/rapache-1.2.8/libapreq2/library/util.c:788:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d, sep, slen); data/rapache-1.2.8/libapreq2/library/util.c:801:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d, sep, slen); data/rapache-1.2.8/libapreq2/library/util.c:816:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d, sep, slen); data/rapache-1.2.8/libapreq2/library/util.c:824:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d,a[0]->data, a[0]->dlen); data/rapache-1.2.8/libapreq2/library/util.c:828:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d, sep, slen); data/rapache-1.2.8/libapreq2/library/util.c:830:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d, a[j]->data, a[j]->dlen); data/rapache-1.2.8/libapreq2/library/util.c:872:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. v[n].iov_base = (char *)(v[n].iov_base) + len; data/rapache-1.2.8/libapreq2/module/apache/handle.c:153:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[HUGE_STRING_LEN]; data/rapache-1.2.8/mod_R.c:376:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c,n,sizeof(RApacheDirective)); data/rapache-1.2.8/mod_R.c:401:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c,n,sizeof(RApacheDirective)); data/rapache-1.2.8/mod_R.c:1803:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strExpires[APR_RFC822_DATE_LEN]; data/rapache-1.2.8/mod_R.c:2290:19: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, INTEGER(object), size * len); data/rapache-1.2.8/mod_R.c:2298:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + j, &l1, size); data/rapache-1.2.8/mod_R.c:2308:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + j, &ll1, size); data/rapache-1.2.8/mod_R.c:2318:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + j, &s1, size); data/rapache-1.2.8/mod_R.c:2333:19: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, REAL(object), size * len); data/rapache-1.2.8/mod_R.c:2340:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+j, &f1, size); data/rapache-1.2.8/mod_R.c:2353:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+j, &ld1, size); data/rapache-1.2.8/mod_R.c:2363:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, COMPLEX(object), size * len); data/rapache-1.2.8/mod_R.c:2366:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, RAW(object), len); /* size = 1 */ data/rapache-1.2.8/mod_R.c:2450:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (len > 0) memcpy(RAW(ans),buf,len); data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/apreq_xs_postperl.h:175:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sv_setpvn(sv, buf, strlen(buf)); data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/apreq_xs_postperl.h:241:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). HV *stash = gv_stashpvn(class, strlen(class), FALSE); data/rapache-1.2.8/libapreq2/glue/perl/xsbuilder/ppport.h:724:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). STRLEN len = strlen(radix); data/rapache-1.2.8/libapreq2/include/apreq_util.h:212:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). apr_status_t rv = apreq_decode(str, &len, str, strlen(str)); data/rapache-1.2.8/libapreq2/library/cookie.c:380:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *f = format + strlen(format); data/rapache-1.2.8/libapreq2/library/cookie.c:398:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). f += strlen(f); \ data/rapache-1.2.8/libapreq2/library/cookie.c:411:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(f, ""); data/rapache-1.2.8/libapreq2/library/cookie.c:413:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). f += strlen(f); data/rapache-1.2.8/libapreq2/library/cookie.c:425:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). f += strlen(f); data/rapache-1.2.8/libapreq2/library/cookie.c:436:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). f += strlen (f); \ data/rapache-1.2.8/libapreq2/library/cookie.c:447:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). f += strlen(f); data/rapache-1.2.8/libapreq2/library/parser.c:228:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). "_dummy_", strlen("_dummy_"), "", 0); data/rapache-1.2.8/libapreq2/library/parser_multipart.c:72:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). apr_size_t slen = strlen(start_string); data/rapache-1.2.8/libapreq2/library/parser_multipart.c:115:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). apr_size_t blen = strlen(bdry), off = 0; data/rapache-1.2.8/libapreq2/library/parser_multipart.c:440:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nlen = strlen(name); data/rapache-1.2.8/libapreq2/library/parser_multipart.c:462:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nlen = strlen(name); data/rapache-1.2.8/libapreq2/library/parser_multipart.c:503:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(ctx->param_name), NULL, len); data/rapache-1.2.8/libapreq2/library/t/at.c:168:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). apr_size_t len = strlen(msg); data/rapache-1.2.8/libapreq2/library/t/parsers.c:153:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). apr_bucket_immortal_create(url_data,strlen(url_data), data/rapache-1.2.8/libapreq2/library/t/parsers.c:180:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (j = 0; j <= strlen(form_data); ++j) { data/rapache-1.2.8/libapreq2/library/t/parsers.c:192:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = 0; i <= strlen(form_data); ++i) { data/rapache-1.2.8/libapreq2/library/t/parsers.c:211:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(form_data), data/rapache-1.2.8/libapreq2/library/t/parsers.c:226:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). AT_int_eq(rv, (j < strlen(form_data)) ? APR_INCOMPLETE : APR_SUCCESS); data/rapache-1.2.8/libapreq2/library/t/parsers.c:242:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). AT_int_eq(len, strlen("... contents of file1.txt ..." CRLF)); data/rapache-1.2.8/libapreq2/library/t/parsers.c:271:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). e = apr_bucket_immortal_create(form_data, strlen(form_data), ba); data/rapache-1.2.8/libapreq2/library/t/parsers.c:311:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(xml_data), data/rapache-1.2.8/libapreq2/library/t/parsers.c:328:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). AT_int_eq(vlen, strlen(xml_data)); data/rapache-1.2.8/libapreq2/library/t/parsers.c:342:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(xml_data), data/rapache-1.2.8/libapreq2/library/t/parsers.c:369:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int dlen = strlen(data); data/rapache-1.2.8/libapreq2/library/t/parsers.c:383:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(rel_data), data/rapache-1.2.8/libapreq2/library/t/parsers.c:457:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(mix_data), data/rapache-1.2.8/libapreq2/library/t/parsers.c:483:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). AT_int_eq(vlen, strlen("... contents of file1.txt ...")); data/rapache-1.2.8/libapreq2/library/t/parsers.c:496:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). AT_int_eq(vlen, strlen("...contents of file2.gif...")); data/rapache-1.2.8/libapreq2/library/util.c:753:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = sep ? strlen(sep) : 0; data/rapache-1.2.8/libapreq2/library/util.c:1106:33: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return apr_bucket_type_file.read(e, str, len, block); data/rapache-1.2.8/libapreq2/module/apache/t/c-modules/apreq_big_request_test/mod_apreq_big_request_test.c:36:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *c = *c + strlen(key) + strlen(value); data/rapache-1.2.8/libapreq2/module/apache/t/c-modules/apreq_big_request_test/mod_apreq_big_request_test.c:36:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *c = *c + strlen(key) + strlen(value); data/rapache-1.2.8/libapreq2/module/apache/t/c-modules/apreq_cookie_test/mod_apreq_cookie_test.c:83:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = strlen(cookie->v.data); data/rapache-1.2.8/libapreq2/module/t/c-modules/apreq_big_request_test/mod_apreq_big_request_test.c:36:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *c = *c + strlen(key) + strlen(value); data/rapache-1.2.8/libapreq2/module/t/c-modules/apreq_big_request_test/mod_apreq_big_request_test.c:36:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *c = *c + strlen(key) + strlen(value); data/rapache-1.2.8/libapreq2/module/t/c-modules/apreq_cookie_test/mod_apreq_cookie_test.c:83:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = strlen(cookie->v.data); data/rapache-1.2.8/libapreq2/module/test_cgi.c:29:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *c += strlen(key) + value_len; data/rapache-1.2.8/mod_R.c:728:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (ptr_R_WriteConsoleEx)(s,strlen(s),1); data/rapache-1.2.8/mod_R.c:1240:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text = Calloc(strlen(fun)+strlen(arg)+5,char); data/rapache-1.2.8/mod_R.c:1240:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text = Calloc(strlen(fun)+strlen(arg)+5,char); data/rapache-1.2.8/mod_R.c:1307:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text = Calloc(strlen(fmt4)+strlen(h->directive->package)+ data/rapache-1.2.8/mod_R.c:1307:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text = Calloc(strlen(fmt4)+strlen(h->directive->package)+ data/rapache-1.2.8/mod_R.c:1308:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(h->directive->function)+ data/rapache-1.2.8/mod_R.c:1309:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(r->filename),char); data/rapache-1.2.8/mod_R.c:1313:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text = Calloc(strlen(fmt3)+strlen(h->directive->function)+ data/rapache-1.2.8/mod_R.c:1313:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text = Calloc(strlen(fmt3)+strlen(h->directive->function)+ data/rapache-1.2.8/mod_R.c:1314:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(r->filename),char); data/rapache-1.2.8/mod_R.c:1330:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text = Calloc(strlen(fmt2)+strlen(h->directive->package)+strlen(h->directive->function),char); data/rapache-1.2.8/mod_R.c:1330:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text = Calloc(strlen(fmt2)+strlen(h->directive->package)+strlen(h->directive->function),char); data/rapache-1.2.8/mod_R.c:1330:70: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text = Calloc(strlen(fmt2)+strlen(h->directive->package)+strlen(h->directive->function),char); data/rapache-1.2.8/mod_R.c:1337:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text = Calloc(strlen(fmt1)+strlen(h->directive->function),char); data/rapache-1.2.8/mod_R.c:1337:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text = Calloc(strlen(fmt1)+strlen(h->directive->function),char); data/rapache-1.2.8/mod_R.c:1679:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nlen = strlen(n); data/rapache-1.2.8/mod_R.c:1684:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(s) == (nlen-2) && strncmp(s, n, nlen-2) == 0) { data/rapache-1.2.8/mod_R.c:1861:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(str); data/rapache-1.2.8/mod_R.c:1880:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(str); data/rapache-1.2.8/mod_R.c:2233:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (apr_brigade_write(MR_BBout,NULL,NULL,s,strlen(s)) != APR_SUCCESS) { ANALYSIS SUMMARY: Hits = 138 Lines analyzed = 16937 in approximately 0.46 seconds (36723 lines/second) Physical Source Lines of Code (SLOC) = 11250 Hits@level = [0] 32 [1] 62 [2] 70 [3] 0 [4] 6 [5] 0 Hits@level+ = [0+] 170 [1+] 138 [2+] 76 [3+] 6 [4+] 6 [5+] 0 Hits/KSLOC@level+ = [0+] 15.1111 [1+] 12.2667 [2+] 6.75556 [3+] 0.533333 [4+] 0.533333 [5+] 0 Dot directories skipped = 3 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.