Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/rsem-1.3.3+dfsg/AlignerRefSeqPolicy.h
Examining data/rsem-1.3.3+dfsg/BamConverter.h
Examining data/rsem-1.3.3+dfsg/BamWriter.h
Examining data/rsem-1.3.3+dfsg/Buffer.h
Examining data/rsem-1.3.3+dfsg/EBSeq/calcClusteringInfo.cpp
Examining data/rsem-1.3.3+dfsg/EM.cpp
Examining data/rsem-1.3.3+dfsg/GTFItem.h
Examining data/rsem-1.3.3+dfsg/Gibbs.cpp
Examining data/rsem-1.3.3+dfsg/GroupInfo.h
Examining data/rsem-1.3.3+dfsg/HitContainer.h
Examining data/rsem-1.3.3+dfsg/HitWrapper.h
Examining data/rsem-1.3.3+dfsg/LenDist.h
Examining data/rsem-1.3.3+dfsg/Model.h
Examining data/rsem-1.3.3+dfsg/ModelParams.h
Examining data/rsem-1.3.3+dfsg/NoiseProfile.h
Examining data/rsem-1.3.3+dfsg/NoiseQProfile.h
Examining data/rsem-1.3.3+dfsg/Orientation.h
Examining data/rsem-1.3.3+dfsg/PairedEndHit.h
Examining data/rsem-1.3.3+dfsg/PairedEndModel.h
Examining data/rsem-1.3.3+dfsg/PairedEndQModel.h
Examining data/rsem-1.3.3+dfsg/PairedEndRead.h
Examining data/rsem-1.3.3+dfsg/PairedEndReadQ.h
Examining data/rsem-1.3.3+dfsg/PolyARules.h
Examining data/rsem-1.3.3+dfsg/Profile.h
Examining data/rsem-1.3.3+dfsg/QProfile.h
Examining data/rsem-1.3.3+dfsg/QualDist.h
Examining data/rsem-1.3.3+dfsg/RSPD.h
Examining data/rsem-1.3.3+dfsg/Read.h
Examining data/rsem-1.3.3+dfsg/ReadIndex.h
Examining data/rsem-1.3.3+dfsg/ReadReader.h
Examining data/rsem-1.3.3+dfsg/RefSeq.h
Examining data/rsem-1.3.3+dfsg/RefSeqPolicy.h
Examining data/rsem-1.3.3+dfsg/Refs.h
Examining data/rsem-1.3.3+dfsg/SamHeader.cpp
Examining data/rsem-1.3.3+dfsg/SamHeader.hpp
Examining data/rsem-1.3.3+dfsg/SamParser.h
Examining data/rsem-1.3.3+dfsg/SingleHit.h
Examining data/rsem-1.3.3+dfsg/SingleModel.h
Examining data/rsem-1.3.3+dfsg/SingleQModel.h
Examining data/rsem-1.3.3+dfsg/SingleRead.h
Examining data/rsem-1.3.3+dfsg/SingleReadQ.h
Examining data/rsem-1.3.3+dfsg/Transcript.h
Examining data/rsem-1.3.3+dfsg/Transcripts.h
Examining data/rsem-1.3.3+dfsg/WriteResults.h
Examining data/rsem-1.3.3+dfsg/bam2readdepth.cpp
Examining data/rsem-1.3.3+dfsg/bam2wig.cpp
Examining data/rsem-1.3.3+dfsg/bc_aux.h
Examining data/rsem-1.3.3+dfsg/buildReadIndex.cpp
Examining data/rsem-1.3.3+dfsg/calcCI.cpp
Examining data/rsem-1.3.3+dfsg/extractRef.cpp
Examining data/rsem-1.3.3+dfsg/getUnique.cpp
Examining data/rsem-1.3.3+dfsg/my_assert.h
Examining data/rsem-1.3.3+dfsg/pRSEM/filterSam2Bed.c
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BGZF.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BGZF.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAux.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamIndex.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamIndex.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamMultiReader.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamMultiReader.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamReader.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamReader.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamReader_p.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamReader_p.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamStandardIndex_p.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamStandardIndex_p.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamToolsIndex_p.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamToolsIndex_p.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamWriter.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamWriter.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamWriter_p.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamWriter_p.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/api_global.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bamread.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bamtools_global.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/cdensum.c
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/const.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/maqmap.c
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/maqmap.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/maqread.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/pc.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/peaks.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/wdl.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BGZF.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BGZF.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAux.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamIndex.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamIndex.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamMultiReader.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamMultiReader.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamReader.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamReader.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamReader_p.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamReader_p.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamStandardIndex_p.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamStandardIndex_p.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamToolsIndex_p.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamToolsIndex_p.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamWriter.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamWriter.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamWriter_p.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamWriter_p.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/api_global.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bamread.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bamtools_global.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/cdensum.c
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/const.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/maqmap.c
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/maqmap.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/maqread.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/pc.h
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/peaks.cpp
Examining data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/wdl.cpp
Examining data/rsem-1.3.3+dfsg/parseIt.cpp
Examining data/rsem-1.3.3+dfsg/preRef.cpp
Examining data/rsem-1.3.3+dfsg/samValidator.cpp
Examining data/rsem-1.3.3+dfsg/sam_utils.h
Examining data/rsem-1.3.3+dfsg/sampling.h
Examining data/rsem-1.3.3+dfsg/scanForPairedEndReads.cpp
Examining data/rsem-1.3.3+dfsg/simul.h
Examining data/rsem-1.3.3+dfsg/simulation.cpp
Examining data/rsem-1.3.3+dfsg/synthesisRef.cpp
Examining data/rsem-1.3.3+dfsg/tbam2gbam.cpp
Examining data/rsem-1.3.3+dfsg/utils.h
Examining data/rsem-1.3.3+dfsg/wiggle.cpp
Examining data/rsem-1.3.3+dfsg/wiggle.h

FINAL RESULTS:

data/rsem-1.3.3+dfsg/EM.cpp:127:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(datF, "%s.dat", imdName);
data/rsem-1.3.3+dfsg/EM.cpp:282:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(modelF, "%s.model", statName);
data/rsem-1.3.3+dfsg/EM.cpp:435:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(out_for_gibbs_F, "%s.ofg", imdName);
data/rsem-1.3.3+dfsg/EM.cpp:484:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(thetaF, "%s.theta", statName);
data/rsem-1.3.3+dfsg/EM.cpp:505:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(outBamF, "%s.transcript.bam", outName);
data/rsem-1.3.3+dfsg/EM.cpp:563:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(refName, argv[1]);
data/rsem-1.3.3+dfsg/EM.cpp:565:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(outName, argv[3]);
data/rsem-1.3.3+dfsg/EM.cpp:566:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imdName, argv[4]);
data/rsem-1.3.3+dfsg/EM.cpp:567:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(statName, argv[5]);
data/rsem-1.3.3+dfsg/EM.cpp:582:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(inpSamF, argv[i + 1]);
data/rsem-1.3.3+dfsg/EM.cpp:600:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(refF, "%s.seq", refName);
data/rsem-1.3.3+dfsg/EM.cpp:604:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tiF, "%s.ti", refName);
data/rsem-1.3.3+dfsg/EM.cpp:607:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cntF, "%s.cnt", statName);
data/rsem-1.3.3+dfsg/EM.cpp:619:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(thetaF, "%s.theta", statName);
data/rsem-1.3.3+dfsg/EM.cpp:622:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(modelF, "%s.model", statName);
data/rsem-1.3.3+dfsg/EM.cpp:631:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(outBamF, "%s.transcript.bam", outName);
data/rsem-1.3.3+dfsg/EM.cpp:633:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(command, "cp %s %s", inpSamF, outBamF);
data/rsem-1.3.3+dfsg/EM.cpp:635:4:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			system(command);
data/rsem-1.3.3+dfsg/EM.cpp:647:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(mparamsF, "%s.mparams", imdName);
data/rsem-1.3.3+dfsg/Gibbs.cpp:107:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(refF, "%s.seq", refName);
data/rsem-1.3.3+dfsg/Gibbs.cpp:112:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(ofgF, "%s.ofg", imdName);
data/rsem-1.3.3+dfsg/Gibbs.cpp:141:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(groupF, "%s.grp", refName);
data/rsem-1.3.3+dfsg/Gibbs.cpp:157:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(omitF, "%s.omit", imdName);
data/rsem-1.3.3+dfsg/Gibbs.cpp:214:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cvsF, "%s.countvectors", imdName);
data/rsem-1.3.3+dfsg/Gibbs.cpp:225:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(outF, "%s%d", cvsF, i);
data/rsem-1.3.3+dfsg/Gibbs.cpp:439:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(refName, argv[1]);
data/rsem-1.3.3+dfsg/Gibbs.cpp:440:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imdName, argv[2]);
data/rsem-1.3.3+dfsg/Gibbs.cpp:441:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(statName, argv[3]);
data/rsem-1.3.3+dfsg/Gibbs.cpp:470:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(fprior, argv[i+1]);
data/rsem-1.3.3+dfsg/Gibbs.cpp:495:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(modelF, "%s.model", statName);
data/rsem-1.3.3+dfsg/ReadIndex.h:25:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(indexF, "%s.ridx", readF);
data/rsem-1.3.3+dfsg/SamHeader.hpp:58:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(h->text, text.c_str());
data/rsem-1.3.3+dfsg/SamParser.h:47:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(rtTag, tag);
data/rsem-1.3.3+dfsg/Transcripts.h:137:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(omitF, "%s.omit", imdName);
data/rsem-1.3.3+dfsg/WriteResults.h:110:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(gtF, "%s.gt", refName);
data/rsem-1.3.3+dfsg/WriteResults.h:111:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(taF, "%s.ta", refName);
data/rsem-1.3.3+dfsg/WriteResults.h:138:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(groupF, "%s.grp", refName);
data/rsem-1.3.3+dfsg/WriteResults.h:225:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(outF, "%s.iso_res", imdName);
data/rsem-1.3.3+dfsg/WriteResults.h:259:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(outF, "%s.allele_res", imdName);
data/rsem-1.3.3+dfsg/WriteResults.h:290:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(outF, "%s.iso_res", imdName);
data/rsem-1.3.3+dfsg/WriteResults.h:316:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(outF, "%s.gene_res", imdName);
data/rsem-1.3.3+dfsg/WriteResults.h:409:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(outF, "%s.iso_res", imdName);
data/rsem-1.3.3+dfsg/WriteResults.h:427:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(outF, "%s.allele_res", imdName);
data/rsem-1.3.3+dfsg/WriteResults.h:446:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(outF, "%s.iso_res", imdName);
data/rsem-1.3.3+dfsg/WriteResults.h:464:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(outF, "%s.gene_res", imdName);
data/rsem-1.3.3+dfsg/WriteResults.h:490:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(groupF, "%s.grp", refName);
data/rsem-1.3.3+dfsg/WriteResults.h:584:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(outF, "%s.sim.alleles.results", outFN);
data/rsem-1.3.3+dfsg/WriteResults.h:596:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(outF, "%s.sim.isoforms.results", outFN);
data/rsem-1.3.3+dfsg/WriteResults.h:616:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(outF, "%s.sim.genes.results", outFN);
data/rsem-1.3.3+dfsg/buildReadIndex.cpp:25:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(idxF, "%s.ridx", readF);
data/rsem-1.3.3+dfsg/calcCI.cpp:183:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(inpF, "%s%d", cvsF, i);
data/rsem-1.3.3+dfsg/calcCI.cpp:446:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	alleleS ? sprintf(outF, "%s.allele_res", imdName) : sprintf(outF, "%s.iso_res", imdName);
data/rsem-1.3.3+dfsg/calcCI.cpp:446:54:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	alleleS ? sprintf(outF, "%s.allele_res", imdName) : sprintf(outF, "%s.iso_res", imdName);
data/rsem-1.3.3+dfsg/calcCI.cpp:464:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(outF, "%s.iso_res", imdName);
data/rsem-1.3.3+dfsg/calcCI.cpp:482:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(outF, "%s.gene_res", imdName);
data/rsem-1.3.3+dfsg/calcCI.cpp:516:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(refName, argv[1]);
data/rsem-1.3.3+dfsg/calcCI.cpp:517:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(imdName, argv[2]);
data/rsem-1.3.3+dfsg/calcCI.cpp:518:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(statName, argv[3]);
data/rsem-1.3.3+dfsg/calcCI.cpp:542:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(refF, "%s.seq", refName);
data/rsem-1.3.3+dfsg/calcCI.cpp:546:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(groupF, "%s.grp", refName);
data/rsem-1.3.3+dfsg/calcCI.cpp:558:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmpF, "%s.tmp", imdName);
data/rsem-1.3.3+dfsg/calcCI.cpp:559:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cvsF, "%s.countvectors", imdName);
data/rsem-1.3.3+dfsg/calcCI.cpp:561:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(modelF, "%s.model", statName);
data/rsem-1.3.3+dfsg/extractRef.cpp:260:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(groupF, "%s.grp", refName);
data/rsem-1.3.3+dfsg/extractRef.cpp:261:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tiF, "%s.ti", refName);
data/rsem-1.3.3+dfsg/extractRef.cpp:262:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(refFastaF, "%s.transcripts.fa", refName);
data/rsem-1.3.3+dfsg/extractRef.cpp:263:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(chromListF, "%s.chrlist", refName);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:130:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(originalTagData + tagDataLength, newTag.data());  // removes original null-term, appends newTag + null-term
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:166:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(originalTagData + tagDataLength, newTag.data());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:207:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(originalTagData + tagDataLength, newTag.data());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:130:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(originalTagData + tagDataLength, newTag.data());  // removes original null-term, appends newTag + null-term
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:166:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(originalTagData + tagDataLength, newTag.data());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:207:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(originalTagData + tagDataLength, newTag.data());
data/rsem-1.3.3+dfsg/parseIt.cpp:185:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(groupF, "%s.grp", argv[1]);
data/rsem-1.3.3+dfsg/parseIt.cpp:187:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tiF, "%s.ti", argv[1]);
data/rsem-1.3.3+dfsg/parseIt.cpp:190:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(datF, "%s.dat", argv[2]);
data/rsem-1.3.3+dfsg/parseIt.cpp:191:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(cntF, "%s.cnt", argv[3]);
data/rsem-1.3.3+dfsg/preRef.cpp:58:33:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		if (!strcmp(argv[i], "-f")) { strcpy(exceptionF, argv[i + 1]); }
data/rsem-1.3.3+dfsg/preRef.cpp:70:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(refF, "%s.seq", argv[3]);
data/rsem-1.3.3+dfsg/preRef.cpp:73:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(idxF, "%s.idx.fa", argv[3]);
data/rsem-1.3.3+dfsg/preRef.cpp:81:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(n2g_idxF, "%s.n2g.idx.fa", argv[3]);
data/rsem-1.3.3+dfsg/simulation.cpp:64:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(outReadF[0], "%s.fa", outFN);
data/rsem-1.3.3+dfsg/simulation.cpp:68:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(outReadF[0], "%s.fq", outFN);
data/rsem-1.3.3+dfsg/simulation.cpp:73:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(outReadF[i], "%s_%d.fa", outFN, i + 1);
data/rsem-1.3.3+dfsg/simulation.cpp:78:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(outReadF[i], "%s_%d.fq", outFN, i + 1);
data/rsem-1.3.3+dfsg/simulation.cpp:188:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(refName, argv[1]);
data/rsem-1.3.3+dfsg/simulation.cpp:193:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(refF, "%s.seq", argv[1]);
data/rsem-1.3.3+dfsg/simulation.cpp:196:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tiF, "%s.ti", argv[1]);
data/rsem-1.3.3+dfsg/synthesisRef.cpp:77:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tiF, "%s.ti", refName);
data/rsem-1.3.3+dfsg/synthesisRef.cpp:98:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(groupF, "%s.grp", refName);
data/rsem-1.3.3+dfsg/synthesisRef.cpp:105:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(gtF, "%s.gt", refName);
data/rsem-1.3.3+dfsg/synthesisRef.cpp:109:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	  sprintf(taF, "%s.ta", refName);
data/rsem-1.3.3+dfsg/synthesisRef.cpp:116:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(refFastaF, "%s.transcripts.fa", refName);
data/rsem-1.3.3+dfsg/tbam2gbam.cpp:25:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tiF, "%s.ti", argv[1]);
data/rsem-1.3.3+dfsg/tbam2gbam.cpp:26:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(chr_list, "%s.chrlist", argv[1]);
data/rsem-1.3.3+dfsg/utils.h:142:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(readFs[0], "%s_%s.%s", readFN, tags[tagType], suffix);
data/rsem-1.3.3+dfsg/utils.h:146:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(readFs[0], "%s_%s_1.%s", readFN, tags[tagType], suffix);
data/rsem-1.3.3+dfsg/utils.h:147:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(readFs[1], "%s_%s_2.%s", readFN, tags[tagType], suffix);
data/rsem-1.3.3+dfsg/Orientation.h:36:50:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	int simulate(simul* sampler) { return (sampler->random() < prob[0] ? 0 : 1); }
data/rsem-1.3.3+dfsg/RSPD.h:197:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	return int(sampler->random() * effL);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/maqmap.c:137:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "bN")) >= 0) {
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/maqmap.c:137:14:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	while ((c = getopt(argc, argv, "bN")) >= 0) {
data/rsem-1.3.3+dfsg/sampling.h:13:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
typedef boost::random::mt19937 engine_type;
data/rsem-1.3.3+dfsg/sampling.h:14:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
typedef boost::random::uniform_01<> uniform_01_dist;
data/rsem-1.3.3+dfsg/sampling.h:15:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
typedef boost::random::gamma_distribution<> gamma_dist;
data/rsem-1.3.3+dfsg/sampling.h:16:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
typedef boost::random::variate_generator<engine_type&, uniform_01_dist> uniform_01_generator;
data/rsem-1.3.3+dfsg/sampling.h:17:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
typedef boost::random::variate_generator<engine_type&, gamma_dist> gamma_generator;
data/rsem-1.3.3+dfsg/simul.h:11:61:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
 simul(unsigned int seed) : engine(seed), rg(engine, boost::random::uniform_01<>()) {
data/rsem-1.3.3+dfsg/simul.h:19:17:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	  double prb = random() * arr[len - 1];
data/rsem-1.3.3+dfsg/simul.h:31:13:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	  	l = int(random() * len);
data/rsem-1.3.3+dfsg/simul.h:37:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	double random() { return rg(); };
data/rsem-1.3.3+dfsg/simul.h:40:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	boost::random::mt19937 engine;
data/rsem-1.3.3+dfsg/simul.h:41:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	boost::random::variate_generator<boost::random::mt19937&, boost::random::uniform_01<> > rg;
data/rsem-1.3.3+dfsg/simul.h:41:42:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	boost::random::variate_generator<boost::random::mt19937&, boost::random::uniform_01<> > rg;
data/rsem-1.3.3+dfsg/simul.h:41:67:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	boost::random::variate_generator<boost::random::mt19937&, boost::random::uniform_01<> > rg;
data/rsem-1.3.3+dfsg/BamConverter.h:203:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(bam_aux_get(tmp_b, "ZW") + 1, (uint8_t*)&(prb), bam_aux_type2size('f'));
data/rsem-1.3.3+dfsg/BamConverter.h:210:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				if (p != NULL) memcpy(bam_aux_get(tmp_b2, "ZW") + 1, (uint8_t*)&(prb), bam_aux_type2size('f'));
data/rsem-1.3.3+dfsg/BamWriter.h:44:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(p + 1, (uint8_t*)&(val), bam_aux_type2size('f'));
data/rsem-1.3.3+dfsg/Buffer.h:24:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		ftmpOut.open(tmpF, std::ios::binary);
data/rsem-1.3.3+dfsg/Buffer.h:45:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buffer + cpos, vec, FLOATSIZE * vlen);
data/rsem-1.3.3+dfsg/EBSeq/calcClusteringInfo.cpp:98:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  k = atoi(argv[1]);
data/rsem-1.3.3+dfsg/EM.cpp:73:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char refName[STRLEN], outName[STRLEN];
data/rsem-1.3.3+dfsg/EM.cpp:74:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char imdName[STRLEN], statName[STRLEN];
data/rsem-1.3.3+dfsg/EM.cpp:75:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char refF[STRLEN], cntF[STRLEN], tiF[STRLEN];
data/rsem-1.3.3+dfsg/EM.cpp:76:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char mparamsF[STRLEN];
data/rsem-1.3.3+dfsg/EM.cpp:77:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char modelF[STRLEN], thetaF[STRLEN];
data/rsem-1.3.3+dfsg/EM.cpp:79:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char inpSamF[STRLEN], outBamF[STRLEN], *aux;
data/rsem-1.3.3+dfsg/EM.cpp:81:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char out_for_gibbs_F[STRLEN];
data/rsem-1.3.3+dfsg/EM.cpp:105:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char datF[STRLEN];
data/rsem-1.3.3+dfsg/EM.cpp:108:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char readFs[2][STRLEN];
data/rsem-1.3.3+dfsg/EM.cpp:128:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fin.open(datF);
data/rsem-1.3.3+dfsg/EM.cpp:485:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fo = fopen(thetaF, "w");
data/rsem-1.3.3+dfsg/EM.cpp:564:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	read_type = atoi(argv[2]);
data/rsem-1.3.3+dfsg/EM.cpp:579:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (!strcmp(argv[i], "-p")) { nThreads = atoi(argv[i + 1]); }
data/rsem-1.3.3+dfsg/EM.cpp:583:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			if (atoi(argv[i + 2]) == 1) aux = argv[i + 3];
data/rsem-1.3.3+dfsg/EM.cpp:608:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fin.open(cntF);
data/rsem-1.3.3+dfsg/EM.cpp:620:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fo = fopen(thetaF, "w");
data/rsem-1.3.3+dfsg/EM.cpp:623:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fo = fopen(modelF, "w");
data/rsem-1.3.3+dfsg/EM.cpp:632:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char command[1005];
data/rsem-1.3.3+dfsg/EM.cpp:648:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fin.open(mparamsF);
data/rsem-1.3.3+dfsg/GTFItem.h:59:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		start = atoi(tmp.c_str());
data/rsem-1.3.3+dfsg/GTFItem.h:61:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		end = atoi(tmp.c_str());
data/rsem-1.3.3+dfsg/Gibbs.cpp:57:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char refName[STRLEN], imdName[STRLEN], statName[STRLEN];
data/rsem-1.3.3+dfsg/Gibbs.cpp:58:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char thetaF[STRLEN], ofgF[STRLEN], refF[STRLEN], modelF[STRLEN];
data/rsem-1.3.3+dfsg/Gibbs.cpp:59:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cvsF[STRLEN];
data/rsem-1.3.3+dfsg/Gibbs.cpp:86:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char groupF[STRLEN];
data/rsem-1.3.3+dfsg/Gibbs.cpp:97:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char fprior[STRLEN];
data/rsem-1.3.3+dfsg/Gibbs.cpp:113:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fin.open(ofgF);
data/rsem-1.3.3+dfsg/Gibbs.cpp:153:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char omitF[STRLEN];
data/rsem-1.3.3+dfsg/Gibbs.cpp:158:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fi = fopen(omitF, "r");
data/rsem-1.3.3+dfsg/Gibbs.cpp:175:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fin.open(fprior);
data/rsem-1.3.3+dfsg/Gibbs.cpp:203:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mw, model.getMW(), sizeof(double) * (M + 1)); // otherwise, after exiting this procedure, mw becomes undefined
data/rsem-1.3.3+dfsg/Gibbs.cpp:209:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char outF[STRLEN];
data/rsem-1.3.3+dfsg/Gibbs.cpp:226:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		paramsArray[i].fo = fopen(outF, "w");
data/rsem-1.3.3+dfsg/Gibbs.cpp:443:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	BURNIN = atoi(argv[4]);
data/rsem-1.3.3+dfsg/Gibbs.cpp:444:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	NSAMPLES = atoi(argv[5]);
data/rsem-1.3.3+dfsg/Gibbs.cpp:445:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	GAP = atoi(argv[6]);
data/rsem-1.3.3+dfsg/Gibbs.cpp:457:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (!strcmp(argv[i], "-p")) nThreads = atoi(argv[i + 1]);
data/rsem-1.3.3+dfsg/Gibbs.cpp:496:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *fi = fopen(modelF, "r");
data/rsem-1.3.3+dfsg/GroupInfo.h:35:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *fi = fopen(groupF, "r");
data/rsem-1.3.3+dfsg/LenDist.h:105:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pdf, rv.pdf, sizeof(double) * (span + 1));
data/rsem-1.3.3+dfsg/LenDist.h:106:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cdf, rv.cdf, sizeof(double) * (span + 1));
data/rsem-1.3.3+dfsg/LenDist.h:249:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pdf, this->pdf, sizeof(double) * (span + 1));
data/rsem-1.3.3+dfsg/LenDist.h:251:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cdf, this->cdf, sizeof(double) * (span + 1));
data/rsem-1.3.3+dfsg/NoiseProfile.h:55:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(c, rv.c, sizeof(rv.c));
data/rsem-1.3.3+dfsg/NoiseProfile.h:56:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, rv.p, sizeof(rv.p));
data/rsem-1.3.3+dfsg/NoiseQProfile.h:58:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(c, rv.c, sizeof(rv.c));
data/rsem-1.3.3+dfsg/NoiseQProfile.h:59:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, rv.p, sizeof(rv.p));
data/rsem-1.3.3+dfsg/Orientation.h:19:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(prob, rv.prob, sizeof(rv.prob));
data/rsem-1.3.3+dfsg/PairedEndModel.h:55:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(N, params.N, sizeof(params.N));
data/rsem-1.3.3+dfsg/PairedEndModel.h:237:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char readFs[2][STRLEN];
data/rsem-1.3.3+dfsg/PairedEndModel.h:308:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *fi = fopen(inpF, "r");
data/rsem-1.3.3+dfsg/PairedEndModel.h:335:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *fo = fopen(outF, "w");
data/rsem-1.3.3+dfsg/PairedEndQModel.h:57:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(N, params.N, sizeof(params.N));
data/rsem-1.3.3+dfsg/PairedEndQModel.h:243:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char readFs[2][STRLEN];
data/rsem-1.3.3+dfsg/PairedEndQModel.h:318:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *fi = fopen(inpF, "r");
data/rsem-1.3.3+dfsg/PairedEndQModel.h:347:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *fo = fopen(outF, "w");
data/rsem-1.3.3+dfsg/Profile.h:82:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, rv.p, sizeof(double) * rv.size);
data/rsem-1.3.3+dfsg/QProfile.h:80:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, rv.p, sizeof(rv.p));
data/rsem-1.3.3+dfsg/QualDist.h:48:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p_init, rv.p_init, sizeof(rv.p_init));
data/rsem-1.3.3+dfsg/QualDist.h:49:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p_tran, rv.p_tran, sizeof(rv.p_tran));
data/rsem-1.3.3+dfsg/RSPD.h:104:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pdf, rv.pdf, sizeof(double) * (B + 2));
data/rsem-1.3.3+dfsg/RSPD.h:105:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(cdf, rv.cdf, sizeof(double) * (B + 2));
data/rsem-1.3.3+dfsg/ReadIndex.h:22:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char indexF[STRLEN];
data/rsem-1.3.3+dfsg/ReadIndex.h:26:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fin.open(indexF, std::ios::binary);
data/rsem-1.3.3+dfsg/Refs.h:94:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fin.open(inpF);
data/rsem-1.3.3+dfsg/Refs.h:122:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fin.open(inpF);
data/rsem-1.3.3+dfsg/Refs.h:150:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fout.open(outF);
data/rsem-1.3.3+dfsg/SamParser.h:60:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char rtTag[STRLEN];
data/rsem-1.3.3+dfsg/SingleModel.h:56:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(N, params.N, sizeof(params.N));
data/rsem-1.3.3+dfsg/SingleModel.h:275:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char readFs[2][STRLEN];
data/rsem-1.3.3+dfsg/SingleModel.h:340:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *fi = fopen(inpF, "r");
data/rsem-1.3.3+dfsg/SingleModel.h:371:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *fo = fopen(outF, "w");
data/rsem-1.3.3+dfsg/SingleQModel.h:58:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(N, params.N, sizeof(params.N));
data/rsem-1.3.3+dfsg/SingleQModel.h:285:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char readFs[2][STRLEN];
data/rsem-1.3.3+dfsg/SingleQModel.h:352:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *fi = fopen(inpF, "r");
data/rsem-1.3.3+dfsg/SingleQModel.h:384:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *fo = fopen(outF, "w");
data/rsem-1.3.3+dfsg/Transcripts.h:136:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  char omitF[STRLEN];
data/rsem-1.3.3+dfsg/Transcripts.h:138:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  FILE *fo = fopen(omitF, "w");
data/rsem-1.3.3+dfsg/WriteResults.h:108:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char gtF[STRLEN], taF[STRLEN];
data/rsem-1.3.3+dfsg/WriteResults.h:126:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char outF[STRLEN];
data/rsem-1.3.3+dfsg/WriteResults.h:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char groupF[STRLEN];
data/rsem-1.3.3+dfsg/WriteResults.h:226:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  fo = fopen(outF, "w");
data/rsem-1.3.3+dfsg/WriteResults.h:260:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  fo = fopen(outF, "w");
data/rsem-1.3.3+dfsg/WriteResults.h:291:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  fo = fopen(outF, "w");
data/rsem-1.3.3+dfsg/WriteResults.h:317:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fo = fopen(outF, "w");
data/rsem-1.3.3+dfsg/WriteResults.h:358:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char outF[STRLEN];
data/rsem-1.3.3+dfsg/WriteResults.h:410:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  fo = fopen(outF, "a");
data/rsem-1.3.3+dfsg/WriteResults.h:428:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  fo = fopen(outF, "a");
data/rsem-1.3.3+dfsg/WriteResults.h:447:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  fo = fopen(outF, "a");
data/rsem-1.3.3+dfsg/WriteResults.h:465:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fo = fopen(outF, "a");
data/rsem-1.3.3+dfsg/WriteResults.h:482:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char outF[STRLEN];
data/rsem-1.3.3+dfsg/WriteResults.h:487:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char groupF[STRLEN];
data/rsem-1.3.3+dfsg/WriteResults.h:585:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  fo = fopen(outF, "w");
data/rsem-1.3.3+dfsg/WriteResults.h:597:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fo = fopen(outF, "w");
data/rsem-1.3.3+dfsg/WriteResults.h:617:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fo = fopen(outF, "w");
data/rsem-1.3.3+dfsg/buildReadIndex.cpp:21:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char idxF[STRLEN];
data/rsem-1.3.3+dfsg/buildReadIndex.cpp:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[sizeof(nReads) + sizeof(gap) + sizeof(nPos)];
data/rsem-1.3.3+dfsg/buildReadIndex.cpp:78:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	gap = atoi(argv[1]);
data/rsem-1.3.3+dfsg/buildReadIndex.cpp:79:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	hasQ = atoi(argv[2]);
data/rsem-1.3.3+dfsg/buildReadIndex.cpp:80:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	verbose = !atoi(argv[3]);
data/rsem-1.3.3+dfsg/calcCI.cpp:61:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cvsF[STRLEN], tmpF[STRLEN], command[STRLEN];
data/rsem-1.3.3+dfsg/calcCI.cpp:70:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char refName[STRLEN], imdName[STRLEN], statName[STRLEN];
data/rsem-1.3.3+dfsg/calcCI.cpp:71:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char modelF[STRLEN], groupF[STRLEN], refF[STRLEN];
data/rsem-1.3.3+dfsg/calcCI.cpp:179:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char inpF[STRLEN];
data/rsem-1.3.3+dfsg/calcCI.cpp:184:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		paramsArray[i].fi = fopen(inpF, "r");
data/rsem-1.3.3+dfsg/calcCI.cpp:302:6:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fin.open(tmpF, ios::binary);
data/rsem-1.3.3+dfsg/calcCI.cpp:389:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char outF[STRLEN];
data/rsem-1.3.3+dfsg/calcCI.cpp:447:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fo = fopen(outF, "a");
data/rsem-1.3.3+dfsg/calcCI.cpp:465:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  fo = fopen(outF, "a");
data/rsem-1.3.3+dfsg/calcCI.cpp:483:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fo = fopen(outF, "a");
data/rsem-1.3.3+dfsg/calcCI.cpp:521:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	nCV = atoi(argv[5]);
data/rsem-1.3.3+dfsg/calcCI.cpp:522:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	nSpC = atoi(argv[6]);
data/rsem-1.3.3+dfsg/calcCI.cpp:523:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	nMB = atoi(argv[7]);
data/rsem-1.3.3+dfsg/calcCI.cpp:530:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (!strcmp(argv[i], "-p")) nThreads = atoi(argv[i + 1]);
data/rsem-1.3.3+dfsg/calcCI.cpp:562:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *fi = fopen(modelF, "r");
data/rsem-1.3.3+dfsg/extractRef.cpp:48:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char groupF[STRLEN], tiF[STRLEN], refFastaF[STRLEN];
data/rsem-1.3.3+dfsg/extractRef.cpp:49:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char chromListF[STRLEN];
data/rsem-1.3.3+dfsg/extractRef.cpp:52:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char mappingFile[STRLEN];
data/rsem-1.3.3+dfsg/extractRef.cpp:266:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fout.open(groupF);
data/rsem-1.3.3+dfsg/extractRef.cpp:275:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fout.open(chromListF);
data/rsem-1.3.3+dfsg/extractRef.cpp:283:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fout.open(refFastaF);
data/rsem-1.3.3+dfsg/extractRef.cpp:306:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if (argc < 7 || ((hasMappingFile = atoi(argv[5])) && argc < 8)) {
data/rsem-1.3.3+dfsg/extractRef.cpp:311:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	verbose = !atoi(argv[2]);
data/rsem-1.3.3+dfsg/extractRef.cpp:332:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fin.open(argv[i]);
data/rsem-1.3.3+dfsg/getUnique.cpp:38:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nThreads = atoi(argv[1]);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BGZF.cpp:162:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(UncompressedBlock, UncompressedBlock + inputLength, remaining);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BGZF.cpp:243:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        Stream = fopen(filename.c_str(), mode);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BGZF.cpp:282:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
       memcpy(output, buffer + BlockOffset, copyLength);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BGZF.cpp:301:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    header[BLOCK_HEADER_LENGTH];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BGZF.cpp:322:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(compressedBlock, header, BLOCK_HEADER_LENGTH);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BGZF.cpp:387:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buffer + BlockOffset, input, copyLength);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BGZF.h:185:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { double value; unsigned char valueBuffer[sizeof(double)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BGZF.h:200:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { double value; unsigned char valueBuffer[sizeof(double)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BGZF.h:216:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { float value; unsigned char valueBuffer[sizeof(float)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BGZF.h:227:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { float value; unsigned char valueBuffer[sizeof(float)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BGZF.h:239:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { signed int value; unsigned char valueBuffer[sizeof(signed int)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BGZF.h:250:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { signed int value; unsigned char valueBuffer[sizeof(signed int)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BGZF.h:262:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { signed short value; unsigned char valueBuffer[sizeof(signed short)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BGZF.h:271:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { signed short value; unsigned char valueBuffer[sizeof(signed short)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BGZF.h:281:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { unsigned int value; unsigned char valueBuffer[sizeof(unsigned int)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BGZF.h:292:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { unsigned int value; unsigned char valueBuffer[sizeof(unsigned int)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BGZF.h:304:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { unsigned short value; unsigned char valueBuffer[sizeof(unsigned short)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BGZF.h:313:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { unsigned short value; unsigned char valueBuffer[sizeof(unsigned short)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:126:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char originalTagData[newTagDataLength];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:127:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(originalTagData, TagData.c_str(), tagDataLength + 1);    // '+1' for TagData null-term
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:156:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { unsigned int value; char valueBuffer[sizeof(unsigned int)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:162:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char originalTagData[newTagDataLength];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:163:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(originalTagData, TagData.c_str(), tagDataLength + 1);    // '+1' for TagData null-term
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:167:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(originalTagData + tagDataLength + newTag.size(), un.valueBuffer, sizeof(unsigned int));
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:197:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { float value; char valueBuffer[sizeof(float)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:203:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char originalTagData[newTagDataLength];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:204:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(originalTagData, TagData.c_str(), tagDataLength + 1);    // '+1' for TagData null-term
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:208:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(originalTagData + tagDataLength + newTag.size(), un.valueBuffer, sizeof(float));
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:236:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char newTagData[originalTagDataLength + value.size()];  
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:241:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newTagData, pOriginalTagData, numBytesParsed);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:245:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newTagData + beginningTagDataLength, (char*)value.c_str(), dataLength+1 );
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:255:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newTagData + endTagOffset, pTagData, endTagDataLength);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:287:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char newTagData[originalTagDataLength + sizeof(value)];  
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:292:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newTagData, pOriginalTagData, numBytesParsed);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:295:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        union { unsigned int value; char valueBuffer[sizeof(unsigned int)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:297:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newTagData + beginningTagDataLength, un.valueBuffer, sizeof(unsigned int));
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:307:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newTagData + endTagOffset, pTagData, endTagDataLength);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:343:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char newTagData[originalTagDataLength + sizeof(value)];  
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:348:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newTagData, pOriginalTagData, numBytesParsed);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:351:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        union { float value; char valueBuffer[sizeof(float)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:353:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newTagData + beginningTagDataLength, un.valueBuffer, sizeof(float));
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:363:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newTagData + endTagOffset, pTagData, endTagDataLength);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:405:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( (char*)destination.data(), pTagData, dataLength );
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:466:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&destination, pTagData, destinationLength);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:531:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&destination, pTagData, destinationLength);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:597:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char newTagData[originalTagDataLength];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:604:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newTagData, pOriginalTagData, numBytesParsed);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:615:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newTagData + beginningTagDataLength, pTagData, endTagDataLength );
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamIndex.cpp:143:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    m_indexStream = fopen(filename.c_str(), mode.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamReader_p.cpp:218:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((char*)bAlignment.TagData.data(), tagData, tagDataLength);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamReader_p.cpp:433:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[4];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamReader_p.cpp:504:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[4];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamReader_p.cpp:511:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char x[BAM_CORE_SIZE];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamReader_p.cpp:583:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[4];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamStandardIndex_p.cpp:209:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char magic[4];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamToolsIndex_p.cpp:124:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char magic[4];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamWriter_p.cpp:300:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(cigarData, packedCigar.data(), packedCigarLength);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamWriter_p.cpp:328:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(tagData, al.TagData.data(), tagDataLength);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:143:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int fstart=atoi(str_start.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:145:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int fend=atoi(str_end.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:278:5:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	nm=atoi((str_nm.c_str()+1));
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:284:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int len=atoi(str_len.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:287:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int fpos=atoi(str_pos.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:397:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cline[1024];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:434:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen(fname,"rb");
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:458:5:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	nm=atoi((str_nm.c_str()+1));
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:464:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int len=atoi(str_len.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:467:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int fpos=atoi(str_pos.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:626:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen(fname,"rb");
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:649:5:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	nm=atoi((str_nm.c_str()+1));
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:661:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int fpos=atoi(str_pos.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:676:6:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	nm1=atoi(nms.substr(0,nms.size()-1).c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:681:6:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	nm2=atoi(nms.substr(0,nms.size()-1).c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:819:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen(fname,"rb");
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:847:5:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	nm=atoi((str_nm.c_str()+1));
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:854:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int fpos=atoi(str_pos.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:1006:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen(fname,"rb");
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:1057:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int fpos=atoi(str_pos.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:1217:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen(fname,"rb");
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:1255:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int nm0=atoi(str_nm0.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:1264:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int nm1=atoi(str_nm1.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:1273:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  int nm2=atoi(str_nm2.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:1304:5:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if(atoi(&lc)==nm) {
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:1329:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  int pos=strand*atoi(str_pos.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:1503:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen(fname,"rb");
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:1542:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int fpos=atoi(str_pos.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:1717:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen(fname,"rb");
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:1767:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int len=atoi(str_tend.c_str())-atoi(str_tstart.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:1767:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int len=atoi(str_tend.c_str())-atoi(str_tstart.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:1777:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	fpos=-1*atoi(str_endpos.c_str()); 
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:1779:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	fpos=atoi(str_startpos.c_str()); 
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:1783:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int nm=atoi(str_ndel.c_str())+atoi(str_nins.c_str())+atoi(str_nsub.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:1783:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int nm=atoi(str_ndel.c_str())+atoi(str_nins.c_str())+atoi(str_nsub.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:1783:60:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int nm=atoi(str_ndel.c_str())+atoi(str_nins.c_str())+atoi(str_nsub.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:1943:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen(fname,"rb");
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:1964:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int fpos=atoi(str_pos.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:1970:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int nm=atoi(str_nm.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:1971:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int len=atoi(str_len.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:2121:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen(fname,"rb");
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:2148:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	fpos=atoi(str_spos.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:2150:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	fpos=-1*atoi(str_epos.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:2152:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int nm=atoi(str_qual.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:2275:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen(fname,"rb");
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:2316:5:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	nm=atoi(str_mm.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:2319:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int fpos=atoi(str_spos.c_str());;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:2446:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen(fname,"rb");
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:2492:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	fpos=-1*atoi(str_endpos.c_str()); 
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:2494:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	fpos=atoi(str_startpos.c_str()); 
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:2501:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int nblocks=atoi(str_nblocks.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:2509:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int sgs=atoi(str_sgs.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:2511:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int slen=atoi(str_slen.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:2513:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int snm=atoi(str_snm.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/maqmap.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_NAMELEN];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BGZF.cpp:162:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(UncompressedBlock, UncompressedBlock + inputLength, remaining);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BGZF.cpp:243:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        Stream = fopen(filename.c_str(), mode);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BGZF.cpp:282:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
       memcpy(output, buffer + BlockOffset, copyLength);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BGZF.cpp:301:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    header[BLOCK_HEADER_LENGTH];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BGZF.cpp:322:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(compressedBlock, header, BLOCK_HEADER_LENGTH);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BGZF.cpp:387:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buffer + BlockOffset, input, copyLength);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BGZF.h:185:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { double value; unsigned char valueBuffer[sizeof(double)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BGZF.h:200:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { double value; unsigned char valueBuffer[sizeof(double)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BGZF.h:216:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { float value; unsigned char valueBuffer[sizeof(float)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BGZF.h:227:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { float value; unsigned char valueBuffer[sizeof(float)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BGZF.h:239:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { signed int value; unsigned char valueBuffer[sizeof(signed int)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BGZF.h:250:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { signed int value; unsigned char valueBuffer[sizeof(signed int)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BGZF.h:262:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { signed short value; unsigned char valueBuffer[sizeof(signed short)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BGZF.h:271:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { signed short value; unsigned char valueBuffer[sizeof(signed short)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BGZF.h:281:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { unsigned int value; unsigned char valueBuffer[sizeof(unsigned int)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BGZF.h:292:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { unsigned int value; unsigned char valueBuffer[sizeof(unsigned int)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BGZF.h:304:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { unsigned short value; unsigned char valueBuffer[sizeof(unsigned short)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BGZF.h:313:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { unsigned short value; unsigned char valueBuffer[sizeof(unsigned short)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:126:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char originalTagData[newTagDataLength];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:127:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(originalTagData, TagData.c_str(), tagDataLength + 1);    // '+1' for TagData null-term
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:156:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { unsigned int value; char valueBuffer[sizeof(unsigned int)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:162:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char originalTagData[newTagDataLength];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:163:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(originalTagData, TagData.c_str(), tagDataLength + 1);    // '+1' for TagData null-term
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:167:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(originalTagData + tagDataLength + newTag.size(), un.valueBuffer, sizeof(unsigned int));
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:197:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    union { float value; char valueBuffer[sizeof(float)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:203:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char originalTagData[newTagDataLength];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:204:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(originalTagData, TagData.c_str(), tagDataLength + 1);    // '+1' for TagData null-term
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:208:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(originalTagData + tagDataLength + newTag.size(), un.valueBuffer, sizeof(float));
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:236:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char newTagData[originalTagDataLength + value.size()];  
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:241:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newTagData, pOriginalTagData, numBytesParsed);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:245:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newTagData + beginningTagDataLength, (char*)value.c_str(), dataLength+1 );
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:255:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newTagData + endTagOffset, pTagData, endTagDataLength);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:287:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char newTagData[originalTagDataLength + sizeof(value)];  
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:292:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newTagData, pOriginalTagData, numBytesParsed);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:295:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        union { unsigned int value; char valueBuffer[sizeof(unsigned int)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:297:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newTagData + beginningTagDataLength, un.valueBuffer, sizeof(unsigned int));
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:307:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newTagData + endTagOffset, pTagData, endTagDataLength);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:343:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char newTagData[originalTagDataLength + sizeof(value)];  
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:348:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newTagData, pOriginalTagData, numBytesParsed);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:351:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        union { float value; char valueBuffer[sizeof(float)]; } un;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:353:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newTagData + beginningTagDataLength, un.valueBuffer, sizeof(float));
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:363:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newTagData + endTagOffset, pTagData, endTagDataLength);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:405:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy( (char*)destination.data(), pTagData, dataLength );
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:466:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&destination, pTagData, destinationLength);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:531:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&destination, pTagData, destinationLength);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:597:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char newTagData[originalTagDataLength];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:604:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newTagData, pOriginalTagData, numBytesParsed);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:615:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newTagData + beginningTagDataLength, pTagData, endTagDataLength );
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamIndex.cpp:143:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    m_indexStream = fopen(filename.c_str(), mode.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamReader_p.cpp:218:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((char*)bAlignment.TagData.data(), tagData, tagDataLength);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamReader_p.cpp:433:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[4];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamReader_p.cpp:504:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[4];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamReader_p.cpp:511:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char x[BAM_CORE_SIZE];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamReader_p.cpp:583:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[4];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamStandardIndex_p.cpp:209:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char magic[4];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamToolsIndex_p.cpp:124:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char magic[4];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamWriter_p.cpp:300:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(cigarData, packedCigar.data(), packedCigarLength);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamWriter_p.cpp:328:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(tagData, al.TagData.data(), tagDataLength);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:145:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int fstart=atoi(str_start.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:147:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int fend=atoi(str_end.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:280:5:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	nm=atoi((str_nm.c_str()+1));
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:286:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int len=atoi(str_len.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:289:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int fpos=atoi(str_pos.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:399:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cline[1024];
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:436:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen(fname,"rb");
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:460:5:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	nm=atoi((str_nm.c_str()+1));
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:466:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int len=atoi(str_len.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:469:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int fpos=atoi(str_pos.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:628:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen(fname,"rb");
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:651:5:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	nm=atoi((str_nm.c_str()+1));
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:663:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int fpos=atoi(str_pos.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:678:6:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	nm1=atoi(nms.substr(0,nms.size()-1).c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:683:6:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	nm2=atoi(nms.substr(0,nms.size()-1).c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:821:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen(fname,"rb");
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:849:5:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	nm=atoi((str_nm.c_str()+1));
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:856:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int fpos=atoi(str_pos.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:1008:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen(fname,"rb");
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:1059:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int fpos=atoi(str_pos.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:1219:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen(fname,"rb");
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:1257:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int nm0=atoi(str_nm0.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:1266:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int nm1=atoi(str_nm1.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:1275:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  int nm2=atoi(str_nm2.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:1306:5:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if(atoi(&lc)==nm) {
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:1331:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  int pos=strand*atoi(str_pos.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:1505:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen(fname,"rb");
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:1544:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int fpos=atoi(str_pos.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:1719:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen(fname,"rb");
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:1769:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int len=atoi(str_tend.c_str())-atoi(str_tstart.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:1769:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int len=atoi(str_tend.c_str())-atoi(str_tstart.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:1779:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	fpos=-1*atoi(str_endpos.c_str()); 
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:1781:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	fpos=atoi(str_startpos.c_str()); 
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:1785:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int nm=atoi(str_ndel.c_str())+atoi(str_nins.c_str())+atoi(str_nsub.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:1785:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int nm=atoi(str_ndel.c_str())+atoi(str_nins.c_str())+atoi(str_nsub.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:1785:60:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int nm=atoi(str_ndel.c_str())+atoi(str_nins.c_str())+atoi(str_nsub.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:1945:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen(fname,"rb");
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:1966:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int fpos=atoi(str_pos.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:1972:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int nm=atoi(str_nm.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:1973:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int len=atoi(str_len.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:2123:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen(fname,"rb");
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:2150:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	fpos=atoi(str_spos.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:2152:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	fpos=-1*atoi(str_epos.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:2154:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int nm=atoi(str_qual.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:2277:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen(fname,"rb");
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:2318:5:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	nm=atoi(str_mm.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:2321:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int fpos=atoi(str_spos.c_str());;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:2448:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f=fopen(fname,"rb");
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:2494:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	fpos=-1*atoi(str_endpos.c_str()); 
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:2496:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	fpos=atoi(str_startpos.c_str()); 
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:2503:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      int nblocks=atoi(str_nblocks.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:2511:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int sgs=atoi(str_sgs.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:2513:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int slen=atoi(str_slen.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:2515:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int snm=atoi(str_snm.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/maqmap.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_NAMELEN];
data/rsem-1.3.3+dfsg/parseIt.cpp:38:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char groupF[STRLEN], tiF[STRLEN];
data/rsem-1.3.3+dfsg/parseIt.cpp:39:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char datF[STRLEN], cntF[STRLEN];
data/rsem-1.3.3+dfsg/parseIt.cpp:49:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char readOutFs[3][2][STRLEN];
data/rsem-1.3.3+dfsg/parseIt.cpp:174:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	read_type = atoi(argv[5]);
data/rsem-1.3.3+dfsg/parseIt.cpp:195:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	hit_out.open(datF);
data/rsem-1.3.3+dfsg/preRef.cpp:28:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char refF[STRLEN], idxF[STRLEN], n2g_idxF[STRLEN];
data/rsem-1.3.3+dfsg/preRef.cpp:31:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char exceptionF[STRLEN];
data/rsem-1.3.3+dfsg/preRef.cpp:50:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	polyAChoice = atoi(argv[2]);
data/rsem-1.3.3+dfsg/preRef.cpp:57:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (!strcmp(argv[i], "-l")) { polyALen = atoi(argv[i + 1]); }
data/rsem-1.3.3+dfsg/preRef.cpp:74:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fout.open(idxF);
data/rsem-1.3.3+dfsg/preRef.cpp:82:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fout.open(n2g_idxF);
data/rsem-1.3.3+dfsg/scanForPairedEndReads.cpp:59:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        nThreads = atoi(argv[1]);
data/rsem-1.3.3+dfsg/simulation.cpp:53:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char outReadF[2][STRLEN];
data/rsem-1.3.3+dfsg/simulation.cpp:55:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char refName[STRLEN];
data/rsem-1.3.3+dfsg/simulation.cpp:56:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char refF[STRLEN], tiF[STRLEN];
data/rsem-1.3.3+dfsg/simulation.cpp:200:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fi = fopen(argv[2], "r");
data/rsem-1.3.3+dfsg/simulation.cpp:207:6:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	N = atoi(argv[5]);
data/rsem-1.3.3+dfsg/synthesisRef.cpp:25:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char groupF[STRLEN], tiF[STRLEN], refFastaF[STRLEN];
data/rsem-1.3.3+dfsg/synthesisRef.cpp:26:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char gtF[STRLEN], taF[STRLEN]; // group info between gene and transcript, transcript and allele
data/rsem-1.3.3+dfsg/synthesisRef.cpp:29:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char mappingFile[STRLEN];
data/rsem-1.3.3+dfsg/synthesisRef.cpp:99:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fout.open(groupF);
data/rsem-1.3.3+dfsg/synthesisRef.cpp:106:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  fout.open(gtF);
data/rsem-1.3.3+dfsg/synthesisRef.cpp:110:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  fout.open(taF);
data/rsem-1.3.3+dfsg/synthesisRef.cpp:117:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fout.open(refFastaF);
data/rsem-1.3.3+dfsg/synthesisRef.cpp:146:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if (argc < 5 || ((hasMappingFile = atoi(argv[3])) && argc < 6)) {
data/rsem-1.3.3+dfsg/synthesisRef.cpp:151:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	verbose = !atoi(argv[2]);
data/rsem-1.3.3+dfsg/synthesisRef.cpp:170:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fin.open(argv[i]);
data/rsem-1.3.3+dfsg/tbam2gbam.cpp:13:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char tiF[STRLEN], chr_list[STRLEN];
data/rsem-1.3.3+dfsg/tbam2gbam.cpp:23:73:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (argc == 6) { assert(strcmp(argv[4], "-p") == 0); nThreads = atoi(argv[5]); }
data/rsem-1.3.3+dfsg/utils.h:130:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char tags[3][STRLEN] = {"un", "alignable", "max"};
data/rsem-1.3.3+dfsg/utils.h:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char suffix[STRLEN];
data/rsem-1.3.3+dfsg/utils.h:134:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(suffix, "fa");
data/rsem-1.3.3+dfsg/utils.h:137:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy(suffix, "fq");
data/rsem-1.3.3+dfsg/wiggle.cpp:87:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fo = fopen(output_filename.c_str(), "w");
data/rsem-1.3.3+dfsg/BamConverter.h:259:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    int len = strlen(mis);
data/rsem-1.3.3+dfsg/BamConverter.h:290:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(mis, tmp, len);
data/rsem-1.3.3+dfsg/EM.cpp:147:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			general_assert(hitvs[i]->read(fin), "Cannot read alignments from .dat file!");
data/rsem-1.3.3+dfsg/EM.cpp:188:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ReadType read;
data/rsem-1.3.3+dfsg/EM.cpp:201:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			general_assert(reader->next(read), "Can not load a read!");
data/rsem-1.3.3+dfsg/EM.cpp:210:57:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (needCalcConPrb) { ncpv[i] = model->getNoiseConPrb(read); }
data/rsem-1.3.3+dfsg/EM.cpp:216:57:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if (needCalcConPrb) { hit.setConPrb(model->getConPrb(read, hit)); }
data/rsem-1.3.3+dfsg/EM.cpp:226:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if (updateModel) { mhp->updateNoise(read, fracs[0]); }
data/rsem-1.3.3+dfsg/EM.cpp:233:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				if (updateModel) { mhp->update(read, hit, fracs[id]); }
data/rsem-1.3.3+dfsg/EM.cpp:257:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ReadType read;
data/rsem-1.3.3+dfsg/EM.cpp:265:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		general_assert(reader->next(read), "Can not load a read!");
data/rsem-1.3.3+dfsg/EM.cpp:270:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		ncpv[i] = model->getNoiseConPrb(read);
data/rsem-1.3.3+dfsg/EM.cpp:273:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			hit.setConPrb(model->getConPrb(read, hit));
data/rsem-1.3.3+dfsg/EM.cpp:590:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  int len = strlen(argv[i + 1]);
data/rsem-1.3.3+dfsg/Gibbs.cpp:200:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	model.read(modelF);
data/rsem-1.3.3+dfsg/Gibbs.cpp:460:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  int len = strlen(argv[i + 1]);
data/rsem-1.3.3+dfsg/HitContainer.h:27:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bool read(std::istream&); // each time a read
data/rsem-1.3.3+dfsg/HitContainer.h:63:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
bool HitContainer<HitType>::read(std::istream& in) {
data/rsem-1.3.3+dfsg/HitContainer.h:70:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (!hit.read(in)) return false;
data/rsem-1.3.3+dfsg/LenDist.h:82:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	void read(FILE*);
data/rsem-1.3.3+dfsg/LenDist.h:218:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
void LenDist::read(FILE *fi) {
data/rsem-1.3.3+dfsg/NoiseProfile.h:35:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	void read(FILE*);
data/rsem-1.3.3+dfsg/NoiseProfile.h:119:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
void NoiseProfile::read(FILE *fi) {
data/rsem-1.3.3+dfsg/NoiseQProfile.h:35:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	void read(FILE*);
data/rsem-1.3.3+dfsg/NoiseQProfile.h:132:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
void NoiseQProfile::read(FILE *fi) {
data/rsem-1.3.3+dfsg/Orientation.h:26:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	void read(FILE* fi) {
data/rsem-1.3.3+dfsg/PairedEndHit.h:20:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bool read(std::istream&);
data/rsem-1.3.3+dfsg/PairedEndHit.h:27:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
bool PairedEndHit::read(std::istream& in) {
data/rsem-1.3.3+dfsg/PairedEndModel.h:90:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	double getConPrb(const PairedEndRead& read, const PairedEndHit& hit) {
data/rsem-1.3.3+dfsg/PairedEndModel.h:91:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (read.isLowQuality()) return 0.0;
data/rsem-1.3.3+dfsg/PairedEndModel.h:105:60:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		general_assert(fpos >= 0, "The alignment of fragment " + read.getName() + " to transcript " + itos(sid) + " starts at " + itos(fpos) + \
data/rsem-1.3.3+dfsg/PairedEndModel.h:108:59:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		general_assert(fpos + insertLen <= totLen,"Fragment " + read.getName() + " is hung over the end of transcript " + itos(sid) + "! " \
data/rsem-1.3.3+dfsg/PairedEndModel.h:110:53:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		general_assert(insertLen <= totLen, "Fragment " + read.getName() + " has length " + itos(insertLen) + ", but it is aligned to transcript " \
data/rsem-1.3.3+dfsg/PairedEndModel.h:119:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		const SingleRead& mate1 = read.getMate1();
data/rsem-1.3.3+dfsg/PairedEndModel.h:123:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		const SingleRead& mate2 = read.getMate2();
data/rsem-1.3.3+dfsg/PairedEndModel.h:136:45:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	double getNoiseConPrb(const PairedEndRead& read) {
data/rsem-1.3.3+dfsg/PairedEndModel.h:137:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (read.isLowQuality()) return 0.0;
data/rsem-1.3.3+dfsg/PairedEndModel.h:139:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		const SingleRead& mate1 = read.getMate1();
data/rsem-1.3.3+dfsg/PairedEndModel.h:140:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		const SingleRead& mate2 = read.getMate2();
data/rsem-1.3.3+dfsg/PairedEndModel.h:156:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	void update(const PairedEndRead& read, const PairedEndHit& hit, double frac) {
data/rsem-1.3.3+dfsg/PairedEndModel.h:157:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (read.isLowQuality() || frac < EPSILON) return;
data/rsem-1.3.3+dfsg/PairedEndModel.h:160:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		const SingleRead& mate1 = read.getMate1();
data/rsem-1.3.3+dfsg/PairedEndModel.h:161:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		const SingleRead& mate2 = read.getMate2();
data/rsem-1.3.3+dfsg/PairedEndModel.h:175:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	void updateNoise(const PairedEndRead& read, double frac) {
data/rsem-1.3.3+dfsg/PairedEndModel.h:176:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (read.isLowQuality() || frac < EPSILON) return;
data/rsem-1.3.3+dfsg/PairedEndModel.h:178:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		const SingleRead& mate1 = read.getMate1();
data/rsem-1.3.3+dfsg/PairedEndModel.h:179:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		const SingleRead& mate2 = read.getMate2();
data/rsem-1.3.3+dfsg/PairedEndModel.h:192:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	void read(const char*);
data/rsem-1.3.3+dfsg/PairedEndModel.h:238:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    PairedEndRead read;
data/rsem-1.3.3+dfsg/PairedEndModel.h:249:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    		while (reader.next(read)) {
data/rsem-1.3.3+dfsg/PairedEndModel.h:250:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    			SingleRead mate1 = read.getMate1();
data/rsem-1.3.3+dfsg/PairedEndModel.h:251:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    			SingleRead mate2 = read.getMate2();
data/rsem-1.3.3+dfsg/PairedEndModel.h:253:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    			if (!read.isLowQuality()) {
data/rsem-1.3.3+dfsg/PairedEndModel.h:264:120:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			    fprintf(stderr, "Warning: Read %s is ignored due to at least one of the mates' length < seed length (= %d)!\n", read.getName().c_str(), seedLen);
data/rsem-1.3.3+dfsg/PairedEndModel.h:306:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
void PairedEndModel::read(const char* inpF) {
data/rsem-1.3.3+dfsg/PairedEndModel.h:315:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ori->read(fi);
data/rsem-1.3.3+dfsg/PairedEndModel.h:316:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	gld->read(fi);
data/rsem-1.3.3+dfsg/PairedEndModel.h:317:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	mld->read(fi);
data/rsem-1.3.3+dfsg/PairedEndModel.h:318:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rspd->read(fi);
data/rsem-1.3.3+dfsg/PairedEndModel.h:319:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	pro->read(fi);
data/rsem-1.3.3+dfsg/PairedEndModel.h:320:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	npro->read(fi);
data/rsem-1.3.3+dfsg/PairedEndModel.h:372:65:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
bool PairedEndModel::simulate(READ_INT_TYPE rid, PairedEndRead& read, int& sid) {
data/rsem-1.3.3+dfsg/PairedEndQModel.h:94:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	double getConPrb(const PairedEndReadQ& read, const PairedEndHit& hit) {
data/rsem-1.3.3+dfsg/PairedEndQModel.h:95:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (read.isLowQuality()) return 0.0;
data/rsem-1.3.3+dfsg/PairedEndQModel.h:109:60:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		general_assert(fpos >= 0, "The alignment of fragment " + read.getName() + " to transcript " + itos(sid) + " starts at " + itos(fpos) + \
data/rsem-1.3.3+dfsg/PairedEndQModel.h:112:59:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		general_assert(fpos + insertLen <= totLen,"Fragment " + read.getName() + " is hung over the end of transcript " + itos(sid) + "! " \
data/rsem-1.3.3+dfsg/PairedEndQModel.h:114:53:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		general_assert(insertLen <= totLen, "Fragment " + read.getName() + " has length " + itos(insertLen) + ", but it is aligned to transcript " \
data/rsem-1.3.3+dfsg/PairedEndQModel.h:122:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		const SingleReadQ& mate1 = read.getMate1();
data/rsem-1.3.3+dfsg/PairedEndQModel.h:126:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		const SingleReadQ& mate2 = read.getMate2();
data/rsem-1.3.3+dfsg/PairedEndQModel.h:140:46:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	double getNoiseConPrb(const PairedEndReadQ& read) {
data/rsem-1.3.3+dfsg/PairedEndQModel.h:141:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (read.isLowQuality()) return 0.0;
data/rsem-1.3.3+dfsg/PairedEndQModel.h:144:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		const SingleReadQ& mate1 = read.getMate1();
data/rsem-1.3.3+dfsg/PairedEndQModel.h:145:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		const SingleReadQ& mate2 = read.getMate2();
data/rsem-1.3.3+dfsg/PairedEndQModel.h:161:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	void update(const PairedEndReadQ& read, const PairedEndHit& hit, double frac) {
data/rsem-1.3.3+dfsg/PairedEndQModel.h:162:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (read.isLowQuality() || frac < EPSILON) return;
data/rsem-1.3.3+dfsg/PairedEndQModel.h:165:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		const SingleReadQ& mate1 = read.getMate1();
data/rsem-1.3.3+dfsg/PairedEndQModel.h:166:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		const SingleReadQ& mate2 = read.getMate2();
data/rsem-1.3.3+dfsg/PairedEndQModel.h:180:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	void updateNoise(const PairedEndReadQ& read, double frac) {
data/rsem-1.3.3+dfsg/PairedEndQModel.h:181:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (read.isLowQuality() || frac < EPSILON) return;
data/rsem-1.3.3+dfsg/PairedEndQModel.h:183:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		const SingleReadQ& mate1 = read.getMate1();
data/rsem-1.3.3+dfsg/PairedEndQModel.h:184:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		const SingleReadQ& mate2 = read.getMate2();
data/rsem-1.3.3+dfsg/PairedEndQModel.h:197:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	void read(const char*);
data/rsem-1.3.3+dfsg/PairedEndQModel.h:244:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    PairedEndReadQ read;
data/rsem-1.3.3+dfsg/PairedEndQModel.h:255:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    		while (reader.next(read)) {
data/rsem-1.3.3+dfsg/PairedEndQModel.h:256:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    			SingleReadQ mate1 = read.getMate1();
data/rsem-1.3.3+dfsg/PairedEndQModel.h:257:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    			SingleReadQ mate2 = read.getMate2();
data/rsem-1.3.3+dfsg/PairedEndQModel.h:259:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    			if (!read.isLowQuality()) {
data/rsem-1.3.3+dfsg/PairedEndQModel.h:273:120:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			    fprintf(stderr, "Warning: Read %s is ignored due to at least one of the mates' length < seed length (= %d)!\n", read.getName().c_str(), seedLen);
data/rsem-1.3.3+dfsg/PairedEndQModel.h:316:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
void PairedEndQModel::read(const char* inpF) {
data/rsem-1.3.3+dfsg/PairedEndQModel.h:325:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ori->read(fi);
data/rsem-1.3.3+dfsg/PairedEndQModel.h:326:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	gld->read(fi);
data/rsem-1.3.3+dfsg/PairedEndQModel.h:327:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	mld->read(fi);
data/rsem-1.3.3+dfsg/PairedEndQModel.h:328:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rspd->read(fi);
data/rsem-1.3.3+dfsg/PairedEndQModel.h:329:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	qd->read(fi);
data/rsem-1.3.3+dfsg/PairedEndQModel.h:330:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	qpro->read(fi);
data/rsem-1.3.3+dfsg/PairedEndQModel.h:331:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	nqpro->read(fi);
data/rsem-1.3.3+dfsg/PairedEndQModel.h:386:67:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
bool PairedEndQModel::simulate(READ_INT_TYPE rid, PairedEndReadQ& read, int& sid) {
data/rsem-1.3.3+dfsg/PairedEndRead.h:20:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bool read(int argc, std::istream* argv[], int flags = 7);
data/rsem-1.3.3+dfsg/PairedEndRead.h:36:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
bool PairedEndRead::read(int argc, std::istream* argv[], int flags) {
data/rsem-1.3.3+dfsg/PairedEndRead.h:42:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	success = mate1.read(1, inpMate1, flags) && mate2.read(1, inpMate2, flags);
data/rsem-1.3.3+dfsg/PairedEndRead.h:42:52:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	success = mate1.read(1, inpMate1, flags) && mate2.read(1, inpMate2, flags);
data/rsem-1.3.3+dfsg/PairedEndReadQ.h:20:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bool read(int argc, std::istream* argv[], int flags = 7);
data/rsem-1.3.3+dfsg/PairedEndReadQ.h:36:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
bool PairedEndReadQ::read(int argc, std::istream* argv[], int flags) {
data/rsem-1.3.3+dfsg/PairedEndReadQ.h:42:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	success = mate1.read(1, inpMate1, flags) && mate2.read(1, inpMate2, flags);
data/rsem-1.3.3+dfsg/PairedEndReadQ.h:42:52:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	success = mate1.read(1, inpMate1, flags) && mate2.read(1, inpMate2, flags);
data/rsem-1.3.3+dfsg/Profile.h:30:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	void read(FILE*);
data/rsem-1.3.3+dfsg/Profile.h:133:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
void Profile::read(FILE *fi) {
data/rsem-1.3.3+dfsg/QProfile.h:26:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	void read(FILE*);
data/rsem-1.3.3+dfsg/QProfile.h:129:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
void QProfile::read(FILE *fi) {
data/rsem-1.3.3+dfsg/QualDist.h:26:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	void read(FILE*);
data/rsem-1.3.3+dfsg/QualDist.h:94:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
void QualDist::read(FILE *fi) {
data/rsem-1.3.3+dfsg/RSPD.h:79:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	void read(FILE*);
data/rsem-1.3.3+dfsg/RSPD.h:138:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
void RSPD::read(FILE *fi) {
data/rsem-1.3.3+dfsg/Read.h:14:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		bool read(int argc, std::istream* argv[], int flags = 7) { return false; }  //read from file, flags, which entries loaded 1 : readseq, 2 : quality score 4 : name
data/rsem-1.3.3+dfsg/ReadIndex.h:32:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			fin.read((char*)&nReads, sizeof(nReads));
data/rsem-1.3.3+dfsg/ReadIndex.h:33:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			fin.read((char*)&gap, sizeof(gap));
data/rsem-1.3.3+dfsg/ReadIndex.h:34:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			fin.read((char*)&nPos, sizeof(nPos));
data/rsem-1.3.3+dfsg/ReadIndex.h:37:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				fin.read((char*)&index[i], sizeof(std::streampos));
data/rsem-1.3.3+dfsg/ReadReader.h:34:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bool next(ReadType& read, int flags = 7) {
data/rsem-1.3.3+dfsg/ReadReader.h:35:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		bool success = read.read(s, (std::istream**)arr, flags);
data/rsem-1.3.3+dfsg/ReadReader.h:35:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		bool success = read.read(s, (std::istream**)arr, flags);
data/rsem-1.3.3+dfsg/ReadReader.h:36:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (success && seedLen > 0) { read.calc_lq(hasPolyA, seedLen); }
data/rsem-1.3.3+dfsg/ReadReader.h:84:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ReadType read;
data/rsem-1.3.3+dfsg/ReadReader.h:94:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while (crid < rid && read.read(s, (std::istream**)arr, 0)) ++crid;
data/rsem-1.3.3+dfsg/ReadReader.h:94:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while (crid < rid && read.read(s, (std::istream**)arr, 0)) ++crid;
data/rsem-1.3.3+dfsg/ReadReader.h:101:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (!read.read(s, (std::istream**)arr, 0)) return false;
data/rsem-1.3.3+dfsg/ReadReader.h:101:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (!read.read(s, (std::istream**)arr, 0)) return false;
data/rsem-1.3.3+dfsg/RefSeq.h:62:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bool read(std::ifstream&, int  = 0);
data/rsem-1.3.3+dfsg/RefSeq.h:108:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
bool RefSeq::read(std::ifstream& fin, int option) {
data/rsem-1.3.3+dfsg/Refs.h:132:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    success = seq.read(fin, option);
data/rsem-1.3.3+dfsg/SamParser.h:41:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int parseNext(SingleRead& read, SingleHit& hit);
data/rsem-1.3.3+dfsg/SamParser.h:42:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int parseNext(SingleReadQ& read, SingleHit& hit);
data/rsem-1.3.3+dfsg/SamParser.h:43:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int parseNext(PairedEndRead& read, PairedEndHit& hit);
data/rsem-1.3.3+dfsg/SamParser.h:44:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int parseNext(PairedEndReadQ& read, PairedEndHit& hit);
data/rsem-1.3.3+dfsg/SamParser.h:115:38:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int SamParser::parseNext(SingleRead& read, SingleHit& hit) {
data/rsem-1.3.3+dfsg/SamParser.h:125:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (readType != 1 || (readType == 1 && read.getName().compare(name) != 0)) {
data/rsem-1.3.3+dfsg/SamParser.h:130:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		general_assert(read.getReadLength() == b->core.l_qseq, "Read " + name + " has alignments with inconsistent read lengths!");
data/rsem-1.3.3+dfsg/SamParser.h:147:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int SamParser::parseNext(SingleReadQ& read, SingleHit& hit) {
data/rsem-1.3.3+dfsg/SamParser.h:157:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (readType != 1 || (readType == 1 && read.getName().compare(name) != 0)) {
data/rsem-1.3.3+dfsg/SamParser.h:162:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		general_assert(read.getReadLength() == b->core.l_qseq, "Read " + name + " has alignments with inconsistent read lengths!");
data/rsem-1.3.3+dfsg/SamParser.h:180:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int SamParser::parseNext(PairedEndRead& read, PairedEndHit& hit) {
data/rsem-1.3.3+dfsg/SamParser.h:199:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (readType != 1 || (readType == 1 && read.getName().compare(name) != 0)) {
data/rsem-1.3.3+dfsg/SamParser.h:206:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		general_assert(read.getMate1().getReadLength() == b->core.l_qseq && read.getMate2().getReadLength() == b2->core.l_qseq, "Paired-end read " + name + " has alignments with inconsistent mate lengths!");
data/rsem-1.3.3+dfsg/SamParser.h:206:71:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		general_assert(read.getMate1().getReadLength() == b->core.l_qseq && read.getMate2().getReadLength() == b2->core.l_qseq, "Paired-end read " + name + " has alignments with inconsistent mate lengths!");
data/rsem-1.3.3+dfsg/SamParser.h:224:42:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int SamParser::parseNext(PairedEndReadQ& read, PairedEndHit& hit) {
data/rsem-1.3.3+dfsg/SamParser.h:243:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (readType != 1 || (readType == 1 && read.getName().compare(name) != 0)) {
data/rsem-1.3.3+dfsg/SamParser.h:250:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		general_assert(read.getMate1().getReadLength() == b->core.l_qseq && read.getMate2().getReadLength() == b2->core.l_qseq, "Paired-end read " + name + " has alignments with inconsistent mate lengths!");
data/rsem-1.3.3+dfsg/SamParser.h:250:71:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		general_assert(read.getMate1().getReadLength() == b->core.l_qseq && read.getMate2().getReadLength() == b2->core.l_qseq, "Paired-end read " + name + " has alignments with inconsistent mate lengths!");
data/rsem-1.3.3+dfsg/SingleHit.h:36:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bool read(std::istream&);
data/rsem-1.3.3+dfsg/SingleHit.h:44:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
bool SingleHit::read(std::istream& in) {
data/rsem-1.3.3+dfsg/SingleModel.h:95:37:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	double getConPrb(const SingleRead& read, const SingleHit& hit) {
data/rsem-1.3.3+dfsg/SingleModel.h:96:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (read.isLowQuality()) return 0.0;
data/rsem-1.3.3+dfsg/SingleModel.h:105:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		int readLen = read.getReadLength();
data/rsem-1.3.3+dfsg/SingleModel.h:108:56:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		general_assert(fpos >= 0, "The alignment of read " + read.getName() + " to transcript " + itos(sid) + " starts at " + itos(fpos) + \
data/rsem-1.3.3+dfsg/SingleModel.h:111:53:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		general_assert(fpos + readLen <= totLen,"Read " + read.getName() + " is hung over the end of transcript " + itos(sid) + "! " \
data/rsem-1.3.3+dfsg/SingleModel.h:113:47:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		general_assert(readLen <= totLen, "Read " + read.getName() + " has length " + itos(readLen) + ", but it is aligned to transcript " \
data/rsem-1.3.3+dfsg/SingleModel.h:138:51:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		prob = ori->getProb(dir) * value * pro->getProb(read.getReadSeq(), ref, pos, dir);
data/rsem-1.3.3+dfsg/SingleModel.h:148:42:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	double getNoiseConPrb(const SingleRead& read) {
data/rsem-1.3.3+dfsg/SingleModel.h:149:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (read.isLowQuality()) return 0.0;
data/rsem-1.3.3+dfsg/SingleModel.h:150:44:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		double prob = mld != NULL ? mld->getProb(read.getReadLength()) : gld->getProb(read.getReadLength());
data/rsem-1.3.3+dfsg/SingleModel.h:150:81:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		double prob = mld != NULL ? mld->getProb(read.getReadLength()) : gld->getProb(read.getReadLength());
data/rsem-1.3.3+dfsg/SingleModel.h:151:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		prob *= npro->getProb(read.getReadSeq());
data/rsem-1.3.3+dfsg/SingleModel.h:163:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	void update(const SingleRead& read, const SingleHit& hit, double frac) {
data/rsem-1.3.3+dfsg/SingleModel.h:164:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (read.isLowQuality() || frac < EPSILON) return;
data/rsem-1.3.3+dfsg/SingleModel.h:180:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				int readLen = read.getReadLength();
data/rsem-1.3.3+dfsg/SingleModel.h:208:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		pro->update(read.getReadSeq(), ref, pos, dir, frac);
data/rsem-1.3.3+dfsg/SingleModel.h:211:37:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	void updateNoise(const SingleRead& read, double frac) {
data/rsem-1.3.3+dfsg/SingleModel.h:212:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (read.isLowQuality() || frac < EPSILON) return;
data/rsem-1.3.3+dfsg/SingleModel.h:214:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		npro->update(read.getReadSeq(), frac);
data/rsem-1.3.3+dfsg/SingleModel.h:229:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	void read(const char*);
data/rsem-1.3.3+dfsg/SingleModel.h:276:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	SingleRead read;
data/rsem-1.3.3+dfsg/SingleModel.h:288:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			while (reader.next(read)) {
data/rsem-1.3.3+dfsg/SingleModel.h:289:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				if (!read.isLowQuality()) {
data/rsem-1.3.3+dfsg/SingleModel.h:290:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					mld != NULL ? mld->update(read.getReadLength(), 1.0) : gld->update(read.getReadLength(), 1.0);
data/rsem-1.3.3+dfsg/SingleModel.h:290:73:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					mld != NULL ? mld->update(read.getReadLength(), 1.0) : gld->update(read.getReadLength(), 1.0);
data/rsem-1.3.3+dfsg/SingleModel.h:291:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					if (i == 0) { npro->updateC(read.getReadSeq()); }
data/rsem-1.3.3+dfsg/SingleModel.h:293:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				else if (read.getReadLength() < seedLen)
data/rsem-1.3.3+dfsg/SingleModel.h:295:106:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				    fprintf(stderr, "Warning: Read %s is ignored due to read length (= %d) < seed length (= %d)!\n", read.getName().c_str(), read.getReadLength(), seedLen);
data/rsem-1.3.3+dfsg/SingleModel.h:295:130:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				    fprintf(stderr, "Warning: Read %s is ignored due to read length (= %d) < seed length (= %d)!\n", read.getName().c_str(), read.getReadLength(), seedLen);
data/rsem-1.3.3+dfsg/SingleModel.h:338:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
void SingleModel::read(const char* inpF) {
data/rsem-1.3.3+dfsg/SingleModel.h:347:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ori->read(fi);
data/rsem-1.3.3+dfsg/SingleModel.h:348:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	gld->read(fi);
data/rsem-1.3.3+dfsg/SingleModel.h:352:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		mld->read(fi);
data/rsem-1.3.3+dfsg/SingleModel.h:354:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rspd->read(fi);
data/rsem-1.3.3+dfsg/SingleModel.h:355:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	pro->read(fi);
data/rsem-1.3.3+dfsg/SingleModel.h:356:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	npro->read(fi);
data/rsem-1.3.3+dfsg/SingleModel.h:413:59:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
bool SingleModel::simulate(READ_INT_TYPE rid, SingleRead& read, int& sid) {
data/rsem-1.3.3+dfsg/SingleQModel.h:101:38:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	double getConPrb(const SingleReadQ& read, const SingleHit& hit) const {
data/rsem-1.3.3+dfsg/SingleQModel.h:102:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (read.isLowQuality()) return 0.0;
data/rsem-1.3.3+dfsg/SingleQModel.h:111:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		int readLen = read.getReadLength();
data/rsem-1.3.3+dfsg/SingleQModel.h:114:56:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		general_assert(fpos >= 0, "The alignment of read " + read.getName() + " to transcript " + itos(sid) + " starts at " + itos(fpos) + \
data/rsem-1.3.3+dfsg/SingleQModel.h:117:53:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		general_assert(fpos + readLen <= totLen,"Read " + read.getName() + " is hung over the end of transcript " + itos(sid) + "! " \
data/rsem-1.3.3+dfsg/SingleQModel.h:119:47:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		general_assert(readLen <= totLen, "Read " + read.getName() + " has length " + itos(readLen) + ", but it is aligned to transcript " \
data/rsem-1.3.3+dfsg/SingleQModel.h:144:52:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		prob = ori->getProb(dir) * value * qpro->getProb(read.getReadSeq(), read.getQScore(), ref, pos, dir);
data/rsem-1.3.3+dfsg/SingleQModel.h:144:71:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		prob = ori->getProb(dir) * value * qpro->getProb(read.getReadSeq(), read.getQScore(), ref, pos, dir);
data/rsem-1.3.3+dfsg/SingleQModel.h:153:43:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	double getNoiseConPrb(const SingleReadQ& read) {
data/rsem-1.3.3+dfsg/SingleQModel.h:154:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (read.isLowQuality()) return 0.0;
data/rsem-1.3.3+dfsg/SingleQModel.h:155:44:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		double prob = mld != NULL ? mld->getProb(read.getReadLength()) : gld->getProb(read.getReadLength());
data/rsem-1.3.3+dfsg/SingleQModel.h:155:81:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		double prob = mld != NULL ? mld->getProb(read.getReadLength()) : gld->getProb(read.getReadLength());
data/rsem-1.3.3+dfsg/SingleQModel.h:156:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		prob *= nqpro->getProb(read.getReadSeq(), read.getQScore());
data/rsem-1.3.3+dfsg/SingleQModel.h:156:45:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		prob *= nqpro->getProb(read.getReadSeq(), read.getQScore());
data/rsem-1.3.3+dfsg/SingleQModel.h:168:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	void update(const SingleReadQ& read, const SingleHit& hit, double frac) {
data/rsem-1.3.3+dfsg/SingleQModel.h:169:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (read.isLowQuality() || frac < EPSILON) return;
data/rsem-1.3.3+dfsg/SingleQModel.h:186:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				int readLen = read.getReadLength();
data/rsem-1.3.3+dfsg/SingleQModel.h:214:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		qpro->update(read.getReadSeq(), read.getQScore(), ref, pos, dir, frac);
data/rsem-1.3.3+dfsg/SingleQModel.h:214:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		qpro->update(read.getReadSeq(), read.getQScore(), ref, pos, dir, frac);
data/rsem-1.3.3+dfsg/SingleQModel.h:217:38:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	void updateNoise(const SingleReadQ& read, double frac) {
data/rsem-1.3.3+dfsg/SingleQModel.h:218:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (read.isLowQuality() || frac < EPSILON) return;
data/rsem-1.3.3+dfsg/SingleQModel.h:220:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		nqpro->update(read.getReadSeq(), read.getQScore(), frac);
data/rsem-1.3.3+dfsg/SingleQModel.h:220:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		nqpro->update(read.getReadSeq(), read.getQScore(), frac);
data/rsem-1.3.3+dfsg/SingleQModel.h:237:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	void read(const char*);
data/rsem-1.3.3+dfsg/SingleQModel.h:286:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	SingleReadQ read;
data/rsem-1.3.3+dfsg/SingleQModel.h:298:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			while (reader.next(read)) {
data/rsem-1.3.3+dfsg/SingleQModel.h:299:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				if (!read.isLowQuality()) {
data/rsem-1.3.3+dfsg/SingleQModel.h:300:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					mld != NULL ? mld->update(read.getReadLength(), 1.0) : gld->update(read.getReadLength(), 1.0);
data/rsem-1.3.3+dfsg/SingleQModel.h:300:73:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					mld != NULL ? mld->update(read.getReadLength(), 1.0) : gld->update(read.getReadLength(), 1.0);
data/rsem-1.3.3+dfsg/SingleQModel.h:301:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					qd->update(read.getQScore());
data/rsem-1.3.3+dfsg/SingleQModel.h:302:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					if (i == 0) { nqpro->updateC(read.getReadSeq(), read.getQScore()); }
data/rsem-1.3.3+dfsg/SingleQModel.h:302:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					if (i == 0) { nqpro->updateC(read.getReadSeq(), read.getQScore()); }
data/rsem-1.3.3+dfsg/SingleQModel.h:304:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				else if (read.getReadLength() < seedLen)
data/rsem-1.3.3+dfsg/SingleQModel.h:306:106:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				    fprintf(stderr, "Warning: Read %s is ignored due to read length (= %d) < seed length (= %d)!\n", read.getName().c_str(), read.getReadLength(), seedLen);
data/rsem-1.3.3+dfsg/SingleQModel.h:306:130:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				    fprintf(stderr, "Warning: Read %s is ignored due to read length (= %d) < seed length (= %d)!\n", read.getName().c_str(), read.getReadLength(), seedLen);
data/rsem-1.3.3+dfsg/SingleQModel.h:350:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
void SingleQModel::read(const char* inpF) {
data/rsem-1.3.3+dfsg/SingleQModel.h:359:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ori->read(fi);
data/rsem-1.3.3+dfsg/SingleQModel.h:360:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	gld->read(fi);
data/rsem-1.3.3+dfsg/SingleQModel.h:364:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		mld->read(fi);
data/rsem-1.3.3+dfsg/SingleQModel.h:366:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rspd->read(fi);
data/rsem-1.3.3+dfsg/SingleQModel.h:367:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	qd->read(fi);
data/rsem-1.3.3+dfsg/SingleQModel.h:368:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	qpro->read(fi);
data/rsem-1.3.3+dfsg/SingleQModel.h:369:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	nqpro->read(fi);
data/rsem-1.3.3+dfsg/SingleQModel.h:428:61:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
bool SingleQModel::simulate(READ_INT_TYPE rid, SingleReadQ& read, int& sid) {
data/rsem-1.3.3+dfsg/SingleRead.h:23:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bool read(int argc, std::istream* argv[], int flags = 7);
data/rsem-1.3.3+dfsg/SingleRead.h:37:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
bool SingleRead::read(int argc, std::istream* argv[], int flags) {
data/rsem-1.3.3+dfsg/SingleReadQ.h:24:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bool read(int argc, std::istream* argv[], int flags = 7);
data/rsem-1.3.3+dfsg/SingleReadQ.h:38:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
bool SingleReadQ::read(int argc, std::istream* argv[], int flags) {
data/rsem-1.3.3+dfsg/Transcript.h:77:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	void read(std::ifstream&);
data/rsem-1.3.3+dfsg/Transcript.h:119:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
void Transcript::read(std::ifstream& fin) {
data/rsem-1.3.3+dfsg/Transcripts.h:91:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		transcripts[i].read(fin);
data/rsem-1.3.3+dfsg/calcCI.cpp:169:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	model.read(modelF);
data/rsem-1.3.3+dfsg/calcCI.cpp:337:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				fin.read((char*)(&tsamples[k]), FLOATSIZE);
data/rsem-1.3.3+dfsg/calcCI.cpp:533:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  int len = strlen(argv[i + 1]);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:244:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const unsigned int dataLength = strlen(value.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/BamAlignment.cpp:402:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const unsigned int dataLength = strlen(pTagData);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:76:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cline[strlen(cline)-1]='\0';
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:285:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      string chr=*sit++; chr=chr.substr(3,strlen(chr.c_str()));
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/bed2vector.cpp:465:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      string chr=*sit++; chr=chr.substr(3,strlen(chr.c_str()));
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.2/src/maqmap.c:30:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(mm->ref_name[i]) + 1;
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:244:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const unsigned int dataLength = strlen(value.c_str());
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/BamAlignment.cpp:402:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const unsigned int dataLength = strlen(pTagData);
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:78:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cline[strlen(cline)-1]='\0';
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:287:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      string chr=*sit++; chr=chr.substr(3,strlen(chr.c_str()));
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/bed2vector.cpp:467:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      string chr=*sit++; chr=chr.substr(3,strlen(chr.c_str()));
data/rsem-1.3.3+dfsg/pRSEM/phantompeakqualtools/spp_1.10.1_on_R3.3/src/maqmap.c:30:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(mm->ref_name[i]) + 1;
data/rsem-1.3.3+dfsg/parseIt.cpp:79:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ReadType read, record_read;
data/rsem-1.3.3+dfsg/parseIt.cpp:90:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while ((val = parser->parseNext(read, hit)) >= 0) {
data/rsem-1.3.3+dfsg/parseIt.cpp:119:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			record_read = read; // no pointer, thus safe
data/rsem-1.3.3+dfsg/simulation.cpp:89:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	ReadType read;
data/rsem-1.3.3+dfsg/simulation.cpp:92:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	model.read(modelF);
data/rsem-1.3.3+dfsg/simulation.cpp:122:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		while (!model.simulate(i, read, sid)) { ++resimulation_count; }
data/rsem-1.3.3+dfsg/simulation.cpp:123:3:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		read.write(n_os, os);

ANALYSIS SUMMARY:

Hits = 766
Lines analyzed = 34079 in approximately 0.89 seconds (38081 lines/second)
Physical Source Lines of Code (SLOC) = 23766
Hits@level = [0] 604 [1] 260 [2] 391 [3]  17 [4]  98 [5]   0
Hits@level+ = [0+] 1370 [1+] 766 [2+] 506 [3+] 115 [4+]  98 [5+]   0
Hits/KSLOC@level+ = [0+] 57.6454 [1+] 32.2309 [2+] 21.2909 [3+] 4.83885 [4+] 4.12354 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.