Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.h Examining data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/init_data.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/mmath.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/update.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/dpalphaprey.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/meancounts.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/setparam.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/dpalphaIP.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/result.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/likelihood.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/mmath.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/dpmu.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/setsummary.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/setprior.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/printmap.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/saint.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/dpeta.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/mcmc.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/dpeta0.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/saint.h Examining data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/dpalphaprey.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/meancounts.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/setparam.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/dpalphaIP.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/result.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/likelihood.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/mmath.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/dpmu.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/setsummary.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/setprior.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/printmap.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/saint.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/dpeta.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/mcmc.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/dpeta0.c Examining data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/saint.h Examining data/saint-2.5.0+dfsg/src/SAINTint-ctrl/dpalphaprey.c Examining data/saint-2.5.0+dfsg/src/SAINTint-ctrl/meancounts.c Examining data/saint-2.5.0+dfsg/src/SAINTint-ctrl/setparam.c Examining data/saint-2.5.0+dfsg/src/SAINTint-ctrl/dpalphaIP.c Examining data/saint-2.5.0+dfsg/src/SAINTint-ctrl/result.c Examining data/saint-2.5.0+dfsg/src/SAINTint-ctrl/likelihood.c Examining data/saint-2.5.0+dfsg/src/SAINTint-ctrl/mmath.c Examining data/saint-2.5.0+dfsg/src/SAINTint-ctrl/dpmu.c Examining data/saint-2.5.0+dfsg/src/SAINTint-ctrl/setsummary.c Examining data/saint-2.5.0+dfsg/src/SAINTint-ctrl/setprior.c Examining data/saint-2.5.0+dfsg/src/SAINTint-ctrl/printmap.c Examining data/saint-2.5.0+dfsg/src/SAINTint-ctrl/saint.c Examining data/saint-2.5.0+dfsg/src/SAINTint-ctrl/dpeta.c Examining data/saint-2.5.0+dfsg/src/SAINTint-ctrl/mcmc.c Examining data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c Examining data/saint-2.5.0+dfsg/src/SAINTint-ctrl/dpeta0.c Examining data/saint-2.5.0+dfsg/src/SAINTint-ctrl/saint.h Examining data/saint-2.5.0+dfsg/src/SAINTreformat/saint.h Examining data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c Examining data/saint-2.5.0+dfsg/src/SAINTreformat/mapping.c Examining data/saint-2.5.0+dfsg/src/SAINTreformat/printmap.c Examining data/saint-2.5.0+dfsg/src/SAINTreformat/saint.c Examining data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c Examining data/saint-2.5.0+dfsg/src/SAINTreformat/append.c FINAL RESULTS: data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:28:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpinter, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:29:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->ip[i], buf); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:30:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpinter, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:31:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->bait[i], buf); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:32:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpinter, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:33:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->prey[i], buf); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:34:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpinter, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:131:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->uprey[cur], data->prey[i]); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:132:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->ubait[cur], data->bait[i]); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:328:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpprey, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:329:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->PREY[i], buf); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:331:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpprey, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:332:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->PREYGENE[i], buf); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:357:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(temp[cur], data->BAIT[i]); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:389:30: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). for(i=0;i<data->nbait;i++) strcpy(data->BAIT[i], temp[i]); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:517:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, data->BAIT[data->IP2b[i]]); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:562:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpbait, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:563:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->IP[i], buf); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:564:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpbait, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:565:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->BAIT[i], buf); /* not unique at this point */ data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:566:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpbait, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/saint.c:142:3: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system("mkdir LOG"); /* error logs */ data/saint-2.5.0+dfsg/src/SAINTint-ctrl/saint.c:143:3: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system("mkdir MAPPING"); /* mapping logs */ data/saint-2.5.0+dfsg/src/SAINTint-ctrl/saint.c:144:3: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system("mkdir MCMC"); /* posterior samples */ data/saint-2.5.0+dfsg/src/SAINTint-ctrl/saint.c:145:3: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system("mkdir RESULT"); /* posterior probabilities, other summaries */ data/saint-2.5.0+dfsg/src/SAINTreformat/append.c:39:24: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). for(i=0;i<nIP;i++) strcpy(IP[i], data->IP[data->b2IP[j][i]]); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:67:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpinter, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:68:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->ip[i], buf); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:69:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(allInter[i], buf); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:71:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpinter, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:72:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->bait[i], buf); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:73:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpinter, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:74:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->prey[i], buf); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:75:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(allInter[i], buf); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:76:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpinter, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:95:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(t_prey[cur], data->prey[i]); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:96:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(t_bait[cur], data->bait[i]); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:97:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(t_ip[cur], data->ip[i]); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:104:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->prey[i], t_prey[i]); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:105:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->bait[i], t_bait[i]); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:106:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->ip[i], t_ip[i]); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:139:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpprey, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:144:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->PREY[i], buf); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:147:7: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpprey, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:151:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpprey, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:152:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->PREYGENE[i], buf); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:176:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(uniquePreyGene[j], data->PREYGENE[i]); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:204:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(t_preyname[cur], uniquePrey[j]); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:213:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->PREY[i], t_preyname[i]); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:246:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpbait, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:247:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->IP[i], buf); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:248:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpbait, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:249:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->BAIT[i], buf); /* not unique at this point */ data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:250:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpbait, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTreformat/mapping.c:56:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->uprey[cur], data->prey[i]); data/saint-2.5.0+dfsg/src/SAINTreformat/mapping.c:57:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->ubait[cur], data->bait[i]); data/saint-2.5.0+dfsg/src/SAINTreformat/mapping.c:141:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(uniq[j], x[i]); data/saint-2.5.0+dfsg/src/SAINTreformat/mapping.c:277:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(temp[cur], data->BAIT[i]); data/saint-2.5.0+dfsg/src/SAINTreformat/mapping.c:303:30: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). for(i=0;i<data->nbait;i++) strcpy(data->BAIT[i], temp[i]); data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c:26:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpprey, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c:30:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->PREY[i], buf); data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c:32:7: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpprey, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c:35:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpprey, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c:36:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->PREYGENE[i], buf); data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c:62:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpbait, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c:63:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->IP[i], buf); data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c:64:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpbait, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c:65:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->BAIT[i], buf); /* not unique at this point */ data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c:66:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpbait, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c:97:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpinter, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c:98:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->ip[i], buf); data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c:99:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpinter, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c:100:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->bait[i], buf); data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c:101:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpinter, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c:102:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->prey[i], buf); data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c:103:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpinter, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTreformat/saint.c:103:3: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system("rm -rf interaction.intermediate"); data/saint-2.5.0+dfsg/src/SAINTreformat/saint.c:129:3: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system("mkdir reformat_log"); /* mapping logs */ data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:28:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpinter, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:29:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->ip[i], buf); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:30:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpinter, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:31:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->bait[i], buf); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:32:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpinter, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:33:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->prey[i], buf); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:34:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpinter, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:102:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->uprey[cur], data->prey[i]); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:103:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->ubait[cur], data->bait[i]); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:297:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpprey, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:298:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->PREY[i], buf); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:299:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpprey, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:303:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpprey, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:304:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->PREYGENE[i], buf); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:330:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(temp[cur], data->BAIT[i]); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:362:30: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). for(i=0;i<data->nbait;i++) strcpy(data->BAIT[i], temp[i]); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:490:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, data->BAIT[data->IP2b[i]]); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:535:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpbait, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:536:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->IP[i], buf); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:537:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpbait, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:538:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->BAIT[i], buf); /* not unique at this point */ data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:539:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpbait, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/saint.c:151:3: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system("mkdir LOG"); /* error logs */ data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/saint.c:152:3: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system("mkdir MAPPING"); /* mapping logs */ data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/saint.c:153:3: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system("mkdir MCMC"); /* posterior samples */ data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/saint.c:154:3: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system("mkdir RESULT"); /* posterior probabilities, other summaries */ data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/init_data.c:95:20: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. for(j=0;j<4;j++) fscanf(fp,"%s",buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/init_data.c:97:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fp,"%s",buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/init_data.c:98:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->experiment[j], buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/init_data.c:101:20: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. for(j=0;j<4;j++) fscanf(fp,"%s",buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/init_data.c:103:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fp,"%s",buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/init_data.c:104:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->bait[j], buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/init_data.c:107:20: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. for(j=0;j<4;j++) fscanf(fp,"%s",buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/init_data.c:109:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fp,"%s",buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/init_data.c:119:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fp,"%s",buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/init_data.c:120:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->prey[i], buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/init_data.c:121:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fp,"%s",buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/init_data.c:123:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fp,"%s",buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/init_data.c:125:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fp,"%s",buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/init_data.c:128:7: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fp,"%s",buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/init_data.c:135:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->unique[cur], data->bait[cur]); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/init_data.c:143:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->unique[cur], data->bait[j]); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:75:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(prob, argv[2]); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:78:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(list, argv[2]); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:81:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fbait, argv[2]); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:84:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fprey, argv[2]); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:87:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fmu, argv[2]); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:90:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(iprob, argv[2]); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:27:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpinter, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:28:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->ip[i], buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:29:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpinter, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:30:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->bait[i], buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:31:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpinter, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:32:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->prey[i], buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:33:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpinter, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:103:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->uprey[cur], data->prey[i]); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:104:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->ubait[cur], data->bait[i]); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:301:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpprey, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:302:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->PREY[i], buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:303:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpprey, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:307:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpprey, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:308:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->PREYGENE[i], buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:333:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(temp[cur], data->BAIT[i]); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:365:30: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). for(i=0;i<data->nbait;i++) strcpy(data->BAIT[i], temp[i]); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:492:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, data->BAIT[data->IP2b[i]]); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:537:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpbait, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:538:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->IP[i], buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:539:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpbait, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:540:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(data->BAIT[i], buf); /* not unique at this point */ data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:541:5: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. fscanf(fpbait, "%s", buf); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/saint.c:177:3: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system("mkdir LOG"); /* error logs */ data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/saint.c:178:3: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system("mkdir MAPPING"); /* mapping logs */ data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/saint.c:179:3: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system("mkdir MCMC"); /* posterior samples */ data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/saint.c:180:3: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system("mkdir RESULT"); /* posterior probabilities, other summaries */ data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:10:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:276:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fptemp1 = fopen("PreysNotInData", "w"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:295:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fptemp2 = fopen("PreysNotInList", "w"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:312:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:345:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[data->nIP][256]; data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:473:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fptemp1 = fopen("IPNotInData", "w"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:492:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fptemp2 = fopen("IPNotInList", "w"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:508:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/saint-2.5.0+dfsg/src/SAINTint-ctrl/initdata.c:546:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/saint-2.5.0+dfsg/src/SAINTint-ctrl/printmap.c:5:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("interaction","w"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/printmap.c:17:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("unique_interaction","w"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/printmap.c:40:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("IP","w"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/printmap.c:61:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("bait","w"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/printmap.c:87:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("prey","w"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/result.c:9:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("interactions", "w"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/result.c:25:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("unique_interactions", "w"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/result.c:105:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("preys", "w"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/result.c:115:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("IPs", "w"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/result.c:125:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("baits", "w"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/result.c:163:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp1 = fopen("hist_alpha_prey", "w"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/result.c:164:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp2 = fopen("hist_alpha_IP", "w"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/result.c:165:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp3 = fopen("hist_mu", "w"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/result.c:166:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp4 = fopen("hist_eta", "w"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/result.c:167:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp5 = fopen("hist_eta0", "w"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/result.c:200:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("matrix_form","w"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/result.c:304:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("matrix_form_short","w"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/saint.c:4:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100000]; data/saint-2.5.0+dfsg/src/SAINTint-ctrl/saint.c:23:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100000]; data/saint-2.5.0+dfsg/src/SAINTint-ctrl/saint.c:76:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpinter = fopen(argv[1], "r"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/saint.c:77:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpprey = fopen(argv[2], "r"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/saint.c:78:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpbait = fopen(argv[3], "r"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/saint.c:100:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *burn = atoi(argv[4]); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/saint.c:108:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *iter = atoi(argv[5]); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/saint.c:135:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpinter = fopen(argv[1], "r"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/saint.c:136:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpprey = fopen(argv[2], "r"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/saint.c:137:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpbait = fopen(argv[3], "r"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/saint.c:161:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp1 = fopen("alpha_prey","w"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/saint.c:162:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp2 = fopen("alpha_IP","w"); data/saint-2.5.0+dfsg/src/SAINTint-ctrl/saint.c:163:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp3 = fopen("mu","w"); data/saint-2.5.0+dfsg/src/SAINTreformat/append.c:34:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char IP[500][500]; /* should be enough */ data/saint-2.5.0+dfsg/src/SAINTreformat/append.c:35:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("interaction.new","w"); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:14:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[10000]; data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:148:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). data->preyLen[i] = atoi(buf); /* not unique at this point */ data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:198:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpp = fopen("prey.new", "w"); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:315:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpi = fopen("interaction.intermediate", "w"); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:345:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpb = fopen("bait.new", "w"); data/saint-2.5.0+dfsg/src/SAINTreformat/mapping.c:226:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fptemp1 = fopen("PreysNotInData", "w"); data/saint-2.5.0+dfsg/src/SAINTreformat/mapping.c:245:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fptemp2 = fopen("PreysNotInList", "w"); data/saint-2.5.0+dfsg/src/SAINTreformat/mapping.c:265:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[data->nIP][256]; data/saint-2.5.0+dfsg/src/SAINTreformat/mapping.c:386:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fptemp1 = fopen("IPNotInData", "w"); data/saint-2.5.0+dfsg/src/SAINTreformat/mapping.c:405:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fptemp2 = fopen("IPNotInList", "w"); data/saint-2.5.0+dfsg/src/SAINTreformat/printmap.c:5:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("interaction","w"); data/saint-2.5.0+dfsg/src/SAINTreformat/printmap.c:17:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("unique_interaction","w"); data/saint-2.5.0+dfsg/src/SAINTreformat/printmap.c:40:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("IP","w"); data/saint-2.5.0+dfsg/src/SAINTreformat/printmap.c:61:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("bait","w"); data/saint-2.5.0+dfsg/src/SAINTreformat/printmap.c:87:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("prey","w"); data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c:7:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[10000]; data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c:14:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpprey = fopen("prey.new", "r"); data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c:33:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). data->preyLen[i] = atoi(buf); /* not unique at this point */ data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c:45:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpbait = fopen("bait.new", "r"); data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c:80:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpinter = fopen("interaction.intermediate", "r"); data/saint-2.5.0+dfsg/src/SAINTreformat/saint.c:4:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100000]; data/saint-2.5.0+dfsg/src/SAINTreformat/saint.c:23:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100000]; data/saint-2.5.0+dfsg/src/SAINTreformat/saint.c:51:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpinter = fopen(argv[1], "r"); data/saint-2.5.0+dfsg/src/SAINTreformat/saint.c:52:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpprey = fopen(argv[2], "r"); data/saint-2.5.0+dfsg/src/SAINTreformat/saint.c:53:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpbait = fopen(argv[3], "r"); data/saint-2.5.0+dfsg/src/SAINTreformat/saint.c:54:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(argc == 5) data->_K_ = atoi(argv[4]); data/saint-2.5.0+dfsg/src/SAINTreformat/saint.c:121:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpinter = fopen(argv[1], "r"); data/saint-2.5.0+dfsg/src/SAINTreformat/saint.c:122:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpprey = fopen(argv[2], "r"); data/saint-2.5.0+dfsg/src/SAINTreformat/saint.c:123:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpbait = fopen(argv[3], "r"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:247:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fptemp1 = fopen("PreysNotInData", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:266:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fptemp2 = fopen("PreysNotInList", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:283:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:318:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[data->nIP][256]; data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:446:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fptemp1 = fopen("IPNotInData", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:465:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fptemp2 = fopen("IPNotInList", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:481:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/initdata.c:519:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/printmap.c:5:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("interaction","w"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/printmap.c:17:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("unique_interaction","w"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/printmap.c:40:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("IP","w"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/printmap.c:61:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("bait","w"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/printmap.c:87:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("prey","w"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/result.c:9:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("interactions", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/result.c:26:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("unique_interactions", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/result.c:90:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("preys", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/result.c:100:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("IPs", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/result.c:110:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("baits", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/result.c:148:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp1 = fopen("hist_alpha_prey", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/result.c:149:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp2 = fopen("hist_alpha_IP", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/result.c:150:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp3 = fopen("hist_mu", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/result.c:151:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp4 = fopen("hist_eta", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/result.c:152:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp5 = fopen("hist_eta0", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/result.c:185:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("matrix_form","w"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/result.c:288:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("matrix_form_short","w"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/saint.c:4:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100000]; data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/saint.c:23:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100000]; data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/saint.c:93:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpinter = fopen(argv[1], "r"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/saint.c:94:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpprey = fopen(argv[2], "r"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/saint.c:95:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpbait = fopen(argv[3], "r"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/saint.c:112:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). burn = atoi(argv[4]); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/saint.c:113:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). iter = atoi(argv[5]); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/saint.c:114:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). lowMode = atoi(argv[6]); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/saint.c:115:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). minFold = atoi(argv[7]); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/saint.c:116:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). NORMALIZE = atoi(argv[8]); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/saint.c:144:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpinter = fopen(argv[1], "r"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/saint.c:145:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpprey = fopen(argv[2], "r"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/saint.c:146:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpbait = fopen(argv[3], "r"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/saint.c:167:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp1 = fopen("alpha_prey","w"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/saint.c:168:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp2 = fopen("alpha_IP","w"); data/saint-2.5.0+dfsg/src/SAINTspc-ctrl/saint.c:169:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp3 = fopen("mu","w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/init_data.c:90:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[_MAX_BUF_]; data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:4:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100000]; data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:23:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100000]; data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:39:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prob[_MAX_BUF_]; data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:44:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbait[_MAX_BUF_]; data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:45:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fprey[_MAX_BUF_]; data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:46:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fmu[_MAX_BUF_]; data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:47:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char list[_MAX_BUF_]; data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:48:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char iprob[_MAX_BUF_]; data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:66:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpi = fopen(argv[1], "r"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:73:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen(argv[1], "r"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:74:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp_output = fopen(argv[2], "w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:76:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(prob, "_prob"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:77:22: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp_outprob = fopen(prob, "w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:79:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(list, "_list"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:80:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp_list = fopen(list, "w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:82:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(fbait, "_alpha_bait"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:83:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpbait = fopen(fbait, "w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:85:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(fprey, "_alpha_prey"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:86:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpprey = fopen(fprey, "w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:88:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(fmu, "_mu_prey"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:89:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpmu = fopen(fmu, "w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:91:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(iprob, "_iprob"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:92:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp_iprob = fopen(iprob, "w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:94:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). burn = atoi(argv[3]); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:95:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). iter = atoi(argv[4]); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:98:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tmp = atoi(argv[6]); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:103:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tmp = atoi(argv[7]); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl-matrix/saint.c:108:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tmp = atoi(argv[8]); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:248:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fptemp1 = fopen("PreysNotInData", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:267:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fptemp2 = fopen("PreysNotInList", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:284:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:321:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[data->nIP][500]; data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:448:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fptemp1 = fopen("IPNotInData", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:467:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fptemp2 = fopen("IPNotInList", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:483:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/initdata.c:521:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/printmap.c:5:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("interaction","w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/printmap.c:17:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("unique_interaction","w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/printmap.c:40:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("IP","w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/printmap.c:61:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("bait","w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/printmap.c:87:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("prey","w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/result.c:9:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("interactions", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/result.c:25:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("unique_interactions", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/result.c:77:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("preys", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/result.c:87:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("IPs", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/result.c:97:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("baits", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/result.c:135:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp1 = fopen("hist_alpha_prey", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/result.c:136:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp2 = fopen("hist_alpha_IP", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/result.c:137:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp3 = fopen("hist_mu", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/result.c:138:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp4 = fopen("hist_eta", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/result.c:139:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp5 = fopen("hist_eta0", "w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/result.c:172:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("matrix_form","w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/result.c:240:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("matrix_form_short","w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/saint.c:4:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[10000]; data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/saint.c:23:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[10000]; data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/saint.c:78:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpinter = fopen(argv[1], "r"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/saint.c:79:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpprey = fopen(argv[2], "r"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/saint.c:80:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpbait = fopen(argv[3], "r"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/saint.c:102:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). burn = atoi(argv[4]); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/saint.c:110:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). iter = atoi(argv[5]); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/saint.c:134:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). modelvar = atoi(argv[8]); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/saint.c:142:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). NORMALIZE = atoi(argv[9]); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/saint.c:170:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpinter = fopen(argv[1], "r"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/saint.c:171:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpprey = fopen(argv[2], "r"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/saint.c:172:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fpbait = fopen(argv[3], "r"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/saint.c:197:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp1 = fopen("alpha_prey","w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/saint.c:198:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp2 = fopen("alpha_IP","w"); data/saint-2.5.0+dfsg/src/SAINTspc-noctrl/saint.c:199:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp3 = fopen("mu","w"); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:70:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(allInter[i], " "); data/saint-2.5.0+dfsg/src/SAINTreformat/initdata.c:140:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(buf) > 500) { data/saint-2.5.0+dfsg/src/SAINTreformat/remap.c:27:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(buf) > 500) { ANALYSIS SUMMARY: Hits = 337 Lines analyzed = 13699 in approximately 0.50 seconds (27574 lines/second) Physical Source Lines of Code (SLOC) = 10985 Hits@level = [0] 571 [1] 3 [2] 182 [3] 0 [4] 152 [5] 0 Hits@level+ = [0+] 908 [1+] 337 [2+] 334 [3+] 152 [4+] 152 [5+] 0 Hits/KSLOC@level+ = [0+] 82.6582 [1+] 30.6782 [2+] 30.4051 [3+] 13.8371 [4+] 13.8371 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.