Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/silo-llnl-4.10.2.real/src/pdb/pdconv.c Examining data/silo-llnl-4.10.2.real/src/pdb/detect.c Examining data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c Examining data/silo-llnl-4.10.2.real/src/pdb/pdbio.c Examining data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c Examining data/silo-llnl-4.10.2.real/src/pdb/pdpath.c Examining data/silo-llnl-4.10.2.real/src/pdb/pdbx.c Examining data/silo-llnl-4.10.2.real/src/pdb/pdb.h Examining data/silo-llnl-4.10.2.real/src/pdb/pdlow.c Examining data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c Examining data/silo-llnl-4.10.2.real/src/pdb/pdbmm.c Examining data/silo-llnl-4.10.2.real/src/pdb/pdb.c Examining data/silo-llnl-4.10.2.real/src/netcdf/netcdf.c Examining data/silo-llnl-4.10.2.real/src/netcdf/ent.c Examining data/silo-llnl-4.10.2.real/src/netcdf/obj.c Examining data/silo-llnl-4.10.2.real/src/netcdf/api.c Examining data/silo-llnl-4.10.2.real/src/netcdf/table.h Examining data/silo-llnl-4.10.2.real/src/netcdf/table.c Examining data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf.c Examining data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf_private.h Examining data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb_private.h Examining data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c Examining data/silo-llnl-4.10.2.real/src/fpzip/front.h Examining data/silo-llnl-4.10.2.real/src/fpzip/rcencoder.cpp Examining data/silo-llnl-4.10.2.real/src/fpzip/read.h Examining data/silo-llnl-4.10.2.real/src/fpzip/pccodec.h Examining data/silo-llnl-4.10.2.real/src/fpzip/rcdecoder.cpp Examining data/silo-llnl-4.10.2.real/src/fpzip/pcdecoder.h Examining data/silo-llnl-4.10.2.real/src/fpzip/rcmodel.h Examining data/silo-llnl-4.10.2.real/src/fpzip/rcencoder.h Examining data/silo-llnl-4.10.2.real/src/fpzip/pcencoder.h Examining data/silo-llnl-4.10.2.real/src/fpzip/error.cpp Examining data/silo-llnl-4.10.2.real/src/fpzip/fpe.h Examining data/silo-llnl-4.10.2.real/src/fpzip/rcqsmodel.cpp Examining data/silo-llnl-4.10.2.real/src/fpzip/codec.h Examining data/silo-llnl-4.10.2.real/src/fpzip/rcqsmodel.h Examining data/silo-llnl-4.10.2.real/src/fpzip/write.h Examining data/silo-llnl-4.10.2.real/src/fpzip/fpzip.h Examining data/silo-llnl-4.10.2.real/src/fpzip/read.cpp Examining data/silo-llnl-4.10.2.real/src/fpzip/pcmap.h Examining data/silo-llnl-4.10.2.real/src/fpzip/write.cpp Examining data/silo-llnl-4.10.2.real/src/fpzip/rcdecoder.h Examining data/silo-llnl-4.10.2.real/src/hzip/hzmpredictor.h Examining data/silo-llnl-4.10.2.real/src/hzip/hzutil.cpp Examining data/silo-llnl-4.10.2.real/src/hzip/hzmdecoder.h Examining data/silo-llnl-4.10.2.real/src/hzip/hzmencoder.h Examining data/silo-llnl-4.10.2.real/src/hzip/hzmio.h Examining data/silo-llnl-4.10.2.real/src/hzip/hzmap.h Examining data/silo-llnl-4.10.2.real/src/hzip/hznio.h Examining data/silo-llnl-4.10.2.real/src/hzip/hzmread.cpp Examining data/silo-llnl-4.10.2.real/src/hzip/hzmpredictor.cpp Examining data/silo-llnl-4.10.2.real/src/hzip/hznread.cpp Examining data/silo-llnl-4.10.2.real/src/hzip/hzmdecoder.cpp Examining data/silo-llnl-4.10.2.real/src/hzip/hznwrite.cpp Examining data/silo-llnl-4.10.2.real/src/hzip/hzresidual.h Examining data/silo-llnl-4.10.2.real/src/hzip/hzncodec.h Examining data/silo-llnl-4.10.2.real/src/hzip/ibstream.h Examining data/silo-llnl-4.10.2.real/src/hzip/hznpredictor.cpp Examining data/silo-llnl-4.10.2.real/src/hzip/hzndecoder.h Examining data/silo-llnl-4.10.2.real/src/hzip/bitvector.h Examining data/silo-llnl-4.10.2.real/src/hzip/hzmencoder.cpp Examining data/silo-llnl-4.10.2.real/src/hzip/hzio.h Examining data/silo-llnl-4.10.2.real/src/hzip/hznpredictor.h Examining data/silo-llnl-4.10.2.real/src/hzip/hznencoder.h Examining data/silo-llnl-4.10.2.real/src/hzip/hzmcodec.h Examining data/silo-llnl-4.10.2.real/src/hzip/hzip.h Examining data/silo-llnl-4.10.2.real/src/hzip/hznio.cpp Examining data/silo-llnl-4.10.2.real/src/hzip/hzmio.cpp Examining data/silo-llnl-4.10.2.real/src/hzip/hzmwrite.cpp Examining data/silo-llnl-4.10.2.real/src/hzip/obstream.h Examining data/silo-llnl-4.10.2.real/src/silo_version.c Examining data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c Examining data/silo-llnl-4.10.2.real/src/taurus/taurus.h Examining data/silo-llnl-4.10.2.real/src/taurus/taurus.c Examining data/silo-llnl-4.10.2.real/src/taurus/silo_taurus_private.h Examining data/silo-llnl-4.10.2.real/src/debug/silo_debug.c Examining data/silo-llnl-4.10.2.real/src/debug/silo_debug_private.h Examining data/silo-llnl-4.10.2.real/src/score/schash.c Examining data/silo-llnl-4.10.2.real/src/score/scctla.c Examining data/silo-llnl-4.10.2.real/src/score/scctl.c Examining data/silo-llnl-4.10.2.real/src/score/scstr.c Examining data/silo-llnl-4.10.2.real/src/score/memmove.c Examining data/silo-llnl-4.10.2.real/src/score/score.h Examining data/silo-llnl-4.10.2.real/src/pdbp_drv/silo_pdbp.c Examining data/silo-llnl-4.10.2.real/src/unknown/silo_unknown_private.h Examining data/silo-llnl-4.10.2.real/src/unknown/silo_unknown.c Examining data/silo-llnl-4.10.2.real/src/siloh5_version.c Examining data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5_private.h Examining data/silo-llnl-4.10.2.real/src/hdf5_drv/H5FDsilo.h Examining data/silo-llnl-4.10.2.real/src/hdf5_drv/H5FDsilo.c Examining data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c Examining data/silo-llnl-4.10.2.real/src/filters/f_ale3d.h Examining data/silo-llnl-4.10.2.real/src/filters/filter.h Examining data/silo-llnl-4.10.2.real/src/filters/f_sample.c Examining data/silo-llnl-4.10.2.real/src/filters/f_sample.h Examining data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c Examining data/silo-llnl-4.10.2.real/src/silo/silo_f.h Examining data/silo-llnl-4.10.2.real/src/silo/silo_ns.c Examining data/silo-llnl-4.10.2.real/src/silo/silo_exports.h Examining data/silo-llnl-4.10.2.real/src/silo/alloc.c Examining data/silo-llnl-4.10.2.real/src/silo/silo_drivers.h Examining data/silo-llnl-4.10.2.real/src/silo/silo_private.h Examining data/silo-llnl-4.10.2.real/src/silo/silo_win32_compatibility.h Examining data/silo-llnl-4.10.2.real/src/silo/silo_json.c Examining data/silo-llnl-4.10.2.real/src/silo/silo_f.c Examining data/silo-llnl-4.10.2.real/src/silo/silo_json.h Examining data/silo-llnl-4.10.2.real/src/silo/extface.c Examining data/silo-llnl-4.10.2.real/src/silo/pmpio.h Examining data/silo-llnl-4.10.2.real/src/silo/silo_fcb.c Examining data/silo-llnl-4.10.2.real/src/silo/silo.c Examining data/silo-llnl-4.10.2.real/tests/csg.c Examining data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c Examining data/silo-llnl-4.10.2.real/tests/wave.c Examining data/silo-llnl-4.10.2.real/tests/sami.c Examining data/silo-llnl-4.10.2.real/tests/arbpoly2d.c Examining data/silo-llnl-4.10.2.real/tests/alltypes.c Examining data/silo-llnl-4.10.2.real/tests/mk_nasf_h5.c Examining data/silo-llnl-4.10.2.real/tests/arbpoly.c Examining data/silo-llnl-4.10.2.real/tests/dir.c Examining data/silo-llnl-4.10.2.real/tests/TestReadMask.c Examining data/silo-llnl-4.10.2.real/tests/majorder.c Examining data/silo-llnl-4.10.2.real/tests/onepyramid.c Examining data/silo-llnl-4.10.2.real/tests/ioperf.h Examining data/silo-llnl-4.10.2.real/tests/realloc_obj_and_opts.c Examining data/silo-llnl-4.10.2.real/tests/empty.c Examining data/silo-llnl-4.10.2.real/tests/subhex.c Examining data/silo-llnl-4.10.2.real/tests/twohex.c Examining data/silo-llnl-4.10.2.real/tests/json.c Examining data/silo-llnl-4.10.2.real/tests/obj.c Examining data/silo-llnl-4.10.2.real/tests/group_test.c Examining data/silo-llnl-4.10.2.real/tests/listtypes_main.c Examining data/silo-llnl-4.10.2.real/tests/testpdb.c Examining data/silo-llnl-4.10.2.real/tests/multi_file.c Examining data/silo-llnl-4.10.2.real/tests/simple.c Examining data/silo-llnl-4.10.2.real/tests/ioperf_stdio.c Examining data/silo-llnl-4.10.2.real/tests/ucd1d.c Examining data/silo-llnl-4.10.2.real/tests/testlib.c Examining data/silo-llnl-4.10.2.real/tests/oneprism.c Examining data/silo-llnl-4.10.2.real/tests/cpz1plt.c Examining data/silo-llnl-4.10.2.real/tests/quad.c Examining data/silo-llnl-4.10.2.real/tests/rocket_silo.cxx Examining data/silo-llnl-4.10.2.real/tests/bcastopen.c Examining data/silo-llnl-4.10.2.real/tests/onetet.c Examining data/silo-llnl-4.10.2.real/tests/ioperf_hdf5.c Examining data/silo-llnl-4.10.2.real/tests/efcentering.c Examining data/silo-llnl-4.10.2.real/tests/ioperf_pdb.c Examining data/silo-llnl-4.10.2.real/tests/mk_nasf_pdb.c Examining data/silo-llnl-4.10.2.real/tests/testfs.c Examining data/silo-llnl-4.10.2.real/tests/specmix.c Examining data/silo-llnl-4.10.2.real/tests/ioperf_silo.c Examining data/silo-llnl-4.10.2.real/tests/ucdsamp3.c Examining data/silo-llnl-4.10.2.real/tests/grab.c Examining data/silo-llnl-4.10.2.real/tests/largefile.c Examining data/silo-llnl-4.10.2.real/tests/pmpio_hdf5_test.c Examining data/silo-llnl-4.10.2.real/tests/ucd.c Examining data/silo-llnl-4.10.2.real/tests/testall.c Examining data/silo-llnl-4.10.2.real/tests/readstuff.c Examining data/silo-llnl-4.10.2.real/tests/merge_block.c Examining data/silo-llnl-4.10.2.real/tests/extface.c Examining data/silo-llnl-4.10.2.real/tests/compression.c Examining data/silo-llnl-4.10.2.real/tests/listtypes.c Examining data/silo-llnl-4.10.2.real/tests/multispec.c Examining data/silo-llnl-4.10.2.real/tests/std.c Examining data/silo-llnl-4.10.2.real/tests/rocket.h Examining data/silo-llnl-4.10.2.real/tests/ioperf_sec2.c Examining data/silo-llnl-4.10.2.real/tests/onehex.c Examining data/silo-llnl-4.10.2.real/tests/namescheme.c Examining data/silo-llnl-4.10.2.real/tests/rocket.cxx Examining data/silo-llnl-4.10.2.real/tests/array.c Examining data/silo-llnl-4.10.2.real/tests/mat3d_3across.c Examining data/silo-llnl-4.10.2.real/tests/pmpio_silo_test_mesh.c Examining data/silo-llnl-4.10.2.real/tests/partial_io.c Examining data/silo-llnl-4.10.2.real/tests/version.c Examining data/silo-llnl-4.10.2.real/tests/multi_test.c Examining data/silo-llnl-4.10.2.real/tests/mmadjacency.c Examining data/silo-llnl-4.10.2.real/tests/point.c Examining data/silo-llnl-4.10.2.real/tests/polyzl.c Examining data/silo-llnl-4.10.2.real/tests/pdbtst.c Examining data/silo-llnl-4.10.2.real/tests/spec.c Examining data/silo-llnl-4.10.2.real/tests/ioperf.c Examining data/silo-llnl-4.10.2.real/tools/silock/silock.c Examining data/silo-llnl-4.10.2.real/tools/silex/SiloView.h Examining data/silo-llnl-4.10.2.real/tools/silex/SiloValueView.cpp Examining data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.h Examining data/silo-llnl-4.10.2.real/tools/silex/SiloDirView.h Examining data/silo-llnl-4.10.2.real/tools/silex/SiloDirView.cpp Examining data/silo-llnl-4.10.2.real/tools/silex/SiloDirTreeView.h Examining data/silo-llnl-4.10.2.real/tools/silex/SiloDirTreeView.cpp Examining data/silo-llnl-4.10.2.real/tools/silex/SiloFile.h Examining data/silo-llnl-4.10.2.real/tools/silex/SiloValueView.h Examining data/silo-llnl-4.10.2.real/tools/silex/Explorer.cpp Examining data/silo-llnl-4.10.2.real/tools/silex/Explorer.h Examining data/silo-llnl-4.10.2.real/tools/silex/SiloArrayView.cpp Examining data/silo-llnl-4.10.2.real/tools/silex/SiloArrayView.h Examining data/silo-llnl-4.10.2.real/tools/silex/SiloView.cpp Examining data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp Examining data/silo-llnl-4.10.2.real/tools/silex/SiloFile.cpp Examining data/silo-llnl-4.10.2.real/tools/silex/main.cpp Examining data/silo-llnl-4.10.2.real/tools/python/pydbfile.h Examining data/silo-llnl-4.10.2.real/tools/python/pydbtoc.h Examining data/silo-llnl-4.10.2.real/tools/python/pysilo.h Examining data/silo-llnl-4.10.2.real/tools/python/pysilo.cpp Examining data/silo-llnl-4.10.2.real/tools/python/pydbfile.cpp Examining data/silo-llnl-4.10.2.real/tools/python/pydbtoc.cpp Examining data/silo-llnl-4.10.2.real/tools/json/jsonify_silo_example.c Examining data/silo-llnl-4.10.2.real/tools/mapred/stream_silo.c Examining data/silo-llnl-4.10.2.real/tools/browser/ptr.c Examining data/silo-llnl-4.10.2.real/tools/browser/str.c Examining data/silo-llnl-4.10.2.real/tools/browser/browser.h Examining data/silo-llnl-4.10.2.real/tools/browser/stc.c Examining data/silo-llnl-4.10.2.real/tools/browser/obj.c Examining data/silo-llnl-4.10.2.real/tools/browser/range.c Examining data/silo-llnl-4.10.2.real/tools/browser/num.c Examining data/silo-llnl-4.10.2.real/tools/browser/browser.c Examining data/silo-llnl-4.10.2.real/tools/browser/sym.c Examining data/silo-llnl-4.10.2.real/tools/browser/bif.c Examining data/silo-llnl-4.10.2.real/tools/browser/cons.c Examining data/silo-llnl-4.10.2.real/tools/browser/sdo.c Examining data/silo-llnl-4.10.2.real/tools/browser/prim.c Examining data/silo-llnl-4.10.2.real/tools/browser/parse.c Examining data/silo-llnl-4.10.2.real/tools/browser/output.c Examining data/silo-llnl-4.10.2.real/tools/browser/file.c Examining data/silo-llnl-4.10.2.real/tools/browser/array.c Examining data/silo-llnl-4.10.2.real/tools/browser/func.c Examining data/silo-llnl-4.10.2.real/tools/browser/switch.c Examining data/silo-llnl-4.10.2.real/tools/browser/lex.c Examining data/silo-llnl-4.10.2.real/SiloWindows/include/config.h FINAL RESULTS: data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:832:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_work, list); data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:835:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(deplist, list); data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:1983:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s_data[i], "%s_data", t); data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:1990:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(mesg, "expecting a DB_FLOAT (%d) or DB_DOUBLE (%d) type for `%s' (got %d)", data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:2252:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(mesg, data/silo-llnl-4.10.2.real/src/filters/f_sample.c:520:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(mesg, data/silo-llnl-4.10.2.real/src/hdf5_drv/H5FDsilo.c:255:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(msg, sizeof(msg), Msg "(errno=%d, \"%s\")", \ data/silo-llnl-4.10.2.real/src/hdf5_drv/H5FDsilo.c:1490:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(file->log_name, "%s%s", name, ext); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:971:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(_fullname, "%s%d", #NAME, _j); \ data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:1717:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(totfmtstr, "%s%s", base_name, fmtstr); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:1730:19: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. case 'd': sprintf(retval, totfmtstr, *((int const*) val)); break; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:1731:19: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. case 's': sprintf(retval, totfmtstr, *((char const*) val)); break; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:1732:19: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. case 'f': sprintf(retval, totfmtstr, *((const float*) val)); break; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:4116:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, LINKGRP); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:4159:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, fname); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:4459:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(result, child_fullname); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:4492:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(full, name); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:4496:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(full, name); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5340:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(hdf5VString, "hdf5-%d.%d.%d%s%s", H5_VERS_MAJOR, H5_VERS_MINOR, H5_VERS_RELEASE, data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5429:17: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(msg, tmp); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5741:23: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (!*parent) strcpy(parent, '/'==*name?"/":"."); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5745:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dotdot, name); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5863:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, dbfile->cwg_name); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5919:17: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(name, comp[i].name); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:6082:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(file_value+offset, "%s%s", LINKGRP, cname); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:6845:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((char*)(object+moffset), obj->pdb_names[i]); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:7886:25: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(bigname, "%s%d", name, j+1); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:7901:25: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(bigname, "%s%d", name, j+1); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:7916:25: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(bigname, "%s%d", name, j+1); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:8026:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.label, OPT(_cu._label)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:8027:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.xlabel, OPT(_cu._labels[0])); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:8028:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.ylabel, OPT(_cu._labels[1])); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:8029:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.xunits, OPT(_cu._units[0])); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:8030:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.yunits, OPT(_cu._units[1])); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:8031:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.reference, OPT(_cu._reference)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:8240:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.name, name); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:8242:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.labels[i], OPT(_csgm._labels[i])); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:8243:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.units[i], OPT(_csgm._units[i])); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:8252:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.zonel_name, zonel_name); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:8253:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.mrgtree_name, OPT(_csgm._mrgtree_name)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:8458:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_csgm._meshname, meshname); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:8494:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.meshname, OPT(_csgm._meshname)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:8495:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.label, OPT(_csgm._label)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:8496:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.units, OPT(_csgm._unit)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:9264:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.label[i], OPT(_qm._labels[i])); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:9265:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.units[i], OPT(_qm._units[i])); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:9269:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.mrgtree_name, OPT(_qm._mrgtree_name)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:9663:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.label, OPT(_qm._label)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:9664:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.units, OPT(_qm._unit)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:9665:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.meshid, OPT(_qm._meshname)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:9997:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_um._meshname, name); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:10072:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.zonelist, OPT(zlname)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:10073:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.facelist, OPT(flname)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:10074:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.phzonelist, OPT(_um._phzl_name)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:10076:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.label[i], OPT(_um._labels[i])); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:10077:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.units[i], OPT(_um._units[i])); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:10079:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.mrgtree_name, OPT(_um._mrgtree_name)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:10190:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_um._meshname, name); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:10218:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.zonelist, zlname); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:10219:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.facelist, OPT(flname)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:10220:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.phzonelist, OPT(_um._phzl_name)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:10222:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.label[i], OPT(_um._labels[i])); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:10223:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.units[i], OPT(_um._units[i])); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:10225:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.mrgtree_name, OPT(_um._mrgtree_name)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:10587:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_um._meshname, meshname); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:10641:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.meshid, OPT(_um._meshname)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:10642:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.label, OPT(_um._label)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:10643:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.units, OPT(_um._unit)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:11774:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.meshid, OPT(mname)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:12032:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.matname, OPT(matname)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:12253:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s+len, meshnames[i]); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:12338:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.mrgtree_name, OPT(_mm._mrgtree_name)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:13147:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s+len, varnames[i]); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:13204:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.mmesh_name, OPT(_mm._mmesh_name)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:13441:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s+len, matnames[i]); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:13510:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.mmesh_name, OPT(_mm._mmesh_name)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:13734:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s+len, specnames[i]); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:13799:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.matname, OPT(_mm._matname)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:14087:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.label[i], OPT(_pm._labels[i])); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:14088:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.units[i], OPT(_pm._units[i])); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:14090:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.mrgtree_name, OPT(_pm._mrgtree_name)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:14341:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.meshid, OPT(meshname)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:14342:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.label, OPT(_pm._label)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:14343:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.units, OPT(_pm._unit)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:14540:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s+len, elmtnames[i]); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:14803:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(meshname, s); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:15019:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.src_mesh_name, OPT(mesh_name)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:15561:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmpname, "%s_%s", name, compnames[i]); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:15563:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmpname, "%s_comp%d", name, i); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:15590:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(m.mrgt_name, OPT(mrgt_name)); data/silo-llnl-4.10.2.real/src/hzip/hzmio.h:10:22: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. HZMstream(HZaccess access) : access(access) {} data/silo-llnl-4.10.2.real/src/hzip/hzmio.h:10:32: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. HZMstream(HZaccess access) : access(access) {} data/silo-llnl-4.10.2.real/src/hzip/hzmio.h:10:39: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. HZMstream(HZaccess access) : access(access) {} data/silo-llnl-4.10.2.real/src/hzip/hzmio.h:11:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. HZaccess access; // read or write access data/silo-llnl-4.10.2.real/src/hzip/hznio.h:10:22: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. HZNstream(HZaccess access) : access(access) {} data/silo-llnl-4.10.2.real/src/hzip/hznio.h:10:32: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. HZNstream(HZaccess access) : access(access) {} data/silo-llnl-4.10.2.real/src/hzip/hznio.h:10:39: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. HZNstream(HZaccess access) : access(access) {} data/silo-llnl-4.10.2.real/src/hzip/hznio.h:11:12: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. HZaccess access; // read or write access data/silo-llnl-4.10.2.real/src/netcdf/api.c:289:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, entry->name); data/silo-llnl-4.10.2.real/src/netcdf/api.c:427:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, ent->name); data/silo-llnl-4.10.2.real/src/netcdf/api.c:660:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, ent->name); data/silo-llnl-4.10.2.real/src/netcdf/api.c:696:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(comp_names, ent->compnames); data/silo-llnl-4.10.2.real/src/netcdf/netcdf.c:295:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(silo_err, errmsg); data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf.c:316:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(str, "/%s", str2); data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf.c:318:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(str, "%s/%s", name, str2); data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf.c:319:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(str2, str); data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf.c:328:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(result, str); data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf.c:729:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmpstr, objname); data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf.c:1203:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmpstr, objname); data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf.c:1656:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mname, name); data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf_private.h:178:27: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). #define CLEAR_COMPONENTS {strcpy(comp_names,cdelim);ncomps=0;} data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf_private.h:181:26: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(comp_names, n); \ data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf_private.h:182:26: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(comp_names, cdelim); \ data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf_private.h:188:26: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(comp_names, n); \ data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf_private.h:189:26: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(comp_names, cdelim); \ data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf_private.h:195:26: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(comp_names, n); \ data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf_private.h:196:26: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(comp_names, cdelim); \ data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf_private.h:202:26: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(comp_names, n); \ data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf_private.h:203:26: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(comp_names, cdelim); \ data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf_private.h:209:26: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(comp_names, n); \ data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf_private.h:210:26: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(comp_names, cdelim); \ data/silo-llnl-4.10.2.real/src/pdb/pdb.c:228:32: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if (lite_PD_err[0] == '\0') sprintf(lite_PD_err, "ERROR: %s\n", s); data/silo-llnl-4.10.2.real/src/pdb/pdb.c:312:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(str, name); data/silo-llnl-4.10.2.real/src/pdb/pdb.c:748:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(lite_PD_err, "ERROR: HOST TYPE %s UNKNOWN - PD_TYPEDEF\n", data/silo-llnl-4.10.2.real/src/pdb/pdb.c:760:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(lite_PD_err, "ERROR: FILE TYPE %s UNKNOWN - PD_TYPEDEF\n", data/silo-llnl-4.10.2.real/src/pdb/pdb.c:828:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fullpath, _lite_PD_fixname(file, name)); data/silo-llnl-4.10.2.real/src/pdb/pdb.c:924:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(index, expr); data/silo-llnl-4.10.2.real/src/pdb/pdb.c:939:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(hname, "%s%s", name, index); data/silo-llnl-4.10.2.real/src/pdb/pdb.c:941:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(hname, name); data/silo-llnl-4.10.2.real/src/pdb/pdb.c:1003:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fullpath, _lite_PD_fixname(file, name)); data/silo-llnl-4.10.2.real/src/pdb/pdb.c:1009:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bf, fullpath); data/silo-llnl-4.10.2.real/src/pdb/pdb.c:1050:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bf, fullpath); data/silo-llnl-4.10.2.real/src/pdb/pdb.c:1312:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(lite_PD_err, "ERROR: %s BAD MEMBER TYPE - PD_DEFSTR\n", data/silo-llnl-4.10.2.real/src/pdb/pdb.c:1692:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bf, _lite_PD_fixname(file, name)); data/silo-llnl-4.10.2.real/src/pdb/pdb.h:183:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, name); \ data/silo-llnl-4.10.2.real/src/pdb/pdb.h:190:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, name); \ data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:98:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, _lite_PD_fixname(file, dirname)); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:114:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(lite_PD_err, "ERROR: DIRECTORY %s NOT FOUND - PD_CD\n", data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:122:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(lite_PD_err, "ERROR: BAD DIRECTORY %s - PD_CD\n", dirname); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:192:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. else sprintf(pattern, "%s/*", lite_PD_pwd(file)); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:194:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(pattern, _lite_PD_fixname(file, path)); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:220:12: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(pattern, path); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:343:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cwd, file->current_prefix); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:386:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(outname, inname); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:392:29: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (inname[0] != '/') strcpy(outname, lite_PD_pwd(file)); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:393:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmpstr, inname); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:419:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(outname, node); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:492:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, _lite_PD_fixname(file, dirname)); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:499:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(lite_PD_err, "ERROR: DIRECTORY %s ALREADY EXISTS - PD_MKDIR\n", data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:507:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(head, name); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:515:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(lite_PD_err, "ERROR: DIRECTORY %s DOES NOT EXIST - " data/silo-llnl-4.10.2.real/src/pdb/pdbio.c:151:4: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf (Pbuffer, fmt, ap); data/silo-llnl-4.10.2.real/src/pdb/pdbmm.c:196:41: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. lite_io_printf_hook = (PFfprintf) fprintf; data/silo-llnl-4.10.2.real/src/pdb/pdbx.c:90:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(lite_PD_err, "ATTRIBUTE %s DOESN'T EXIST - PD_GET_ATTR", at); data/silo-llnl-4.10.2.real/src/pdb/pdbx.c:94:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fullname, _lite_PD_fixname(file, vr)); data/silo-llnl-4.10.2.real/src/pdb/pdbx.c:97:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(lite_PD_err, "VARIABLE %s HAS NO ATTRIBUTES - PD_GET_ATTR", data/silo-llnl-4.10.2.real/src/pdb/pdbx.c:104:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(lite_PD_err, "ATTRIBUTE DATA %s DOESN'T EXIST - PD_GET_ATTR", data/silo-llnl-4.10.2.real/src/pdb/pdbx.c:114:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(lite_PD_err, "VARIABLE %s DOESN'T HAVE ATTRIBUTE %s - " data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:86:12: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. extern int fprintf(FILE*, const char*, ...); data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:1293:46: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if (lite_io_printf_hook == (PFfprintf) fprintf) data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:2182:4: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(s, fmt, ap); data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:2204:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(pl, s); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:93:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bf, s); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:135:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bf, s); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:164:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bf, s); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:206:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bf, memb); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:259:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bf, s); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:427:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(bf, s); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:461:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(bf, s); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:494:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, s); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:537:14: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (flag) strcpy(s, _lite_PD_fixname(file, name)); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:538:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(s, name); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:540:26: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (fullname != NULL) strcpy(fullname, s); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:659:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bf, name); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:660:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(head, lite_SC_firsttok(bf, "([\001\n")); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:665:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tail, token); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:692:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(expr, "%s%ld:%ld:%ld,", expr, imin, imax, istep); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:702:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name, "%s[%s]%s", head, expr, tail); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:268:39: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if ((fullname != NULL) && flag) strcpy(fullname, name); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:309:26: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (fullname != NULL) strcpy(fullname, FRAME(path)); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:378:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(CURRENT(intype), type); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:508:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(CURRENT(intype), type); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:618:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(FRAME(path), t); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:694:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(t, CURRENT(intype)); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:749:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(FRAME(path), t); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:756:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(t, type); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:767:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(t, expr); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:770:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, tok); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:788:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(t, CURRENT(intype)); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:845:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(FRAME(path), t); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:853:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, CURRENT(intype)); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:857:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(outtype, type); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:888:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(t, FRAME(path)); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:895:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(FRAME(path), t); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:997:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, path_name); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:1003:10: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s, desc->cast_memb); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:1785:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(text, tok); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:2033:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(msg, "%s *", pvt[-1]); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:2073:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(msg, "%s,%s", pvt[-2], pvt[-0]); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:2084:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(msg, "%s:%s", pvt[-2], pvt[-0]); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:2093:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(msg, "%s:%s:%s", pvt[-4], pvt[-2], pvt[-0]); data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:189:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(index, expr); data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:194:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(hname, "%s%s", fullpath, index); data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:196:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(hname, fullpath); data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:262:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, name); data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:1130:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, name); data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:1173:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, indxpr); data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:1213:22: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (expr != NULL) strcpy(s, expr); data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:1355:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, name); data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:1378:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, expr); data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:1572:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(bf, "CAN'T GET POINTER LENGTH ON %s - _PD_WR_SYMENT", data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:1578:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(bf, "UNKNOWN TYPE %s - _PD_WR_SYMENT", litype); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:629:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(err_str,"PJ_get_group: Probably no such object \"%s\".",objname); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:653:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(error,"Requested %s object \"%s\" is not a %s.", data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:689:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(error,"Requested %s object \"%s\" is not a %s.", data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:1014:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tname, &name[1]); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:1060:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(*var, lit); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:1064:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(*var, lit); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:1305:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (*varname, mvdbspec); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:2377:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, path); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:2387:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, cwd); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:2388:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmpstr, path); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:2423:17: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(name, subpath); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:2477:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(newname, "%s->type", name); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:2481:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(type, ctype); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:2484:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(newname, "%s->ncomponents", name); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:2544:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(type, ep->type); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:2552:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, ep->type); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:2613:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(result, p); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:2773:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name, "%s.type", list[i]); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:2775:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name, "%s->type", list[i]); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:3164:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(newname,"%s/",varname); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:3180:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name, "%s.type", varname); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:3183:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name, "%s->type", varname); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:3376:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(error, "(%s) Not enough material names found\n", me); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:3488:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmpstr, objname); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:3880:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(type, ep->type); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:4854:15: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmp, "%s_data", objname); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:4858:15: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmp, "%s_0_data", objname); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:5177:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmp, objname); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:5663:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmp, objname); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:5873:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmp, objname); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:6458:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mname, (char *)v); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:6497:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmp, "%s->type", mname); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:6650:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(error_message,"\"%s\" ***%s***",path,lite_PD_err); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:7132:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmp, objname); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:10229:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_csgm._meshname, name); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:10645:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_um._meshname, name); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:10843:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_um._meshname, name); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:10859:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(parentComponName, "%s_coord%d", parentmesh, i); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:10874:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(parentComponName, "%s_min_extents", parentmesh); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:10878:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(parentComponName, "%s_max_extents", parentmesh); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:11852:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmp3, "%s_%s", name, compnames[i]); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:11857:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmp3, "%s_comp%d", name, i); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:12557:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(out, cwd); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:12568:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(out, name); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:12573:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(out, suffix); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb_private.h:90:26: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). #define SC_strdup(S) (strcpy(SCALLOC_N(char,strlen((S))+1),(S))) data/silo-llnl-4.10.2.real/src/score/scctl.c:92:12: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. extern int fprintf(FILE*, const char*, ...); data/silo-llnl-4.10.2.real/src/score/scctl.c:114:46: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. PFfprintf lite_io_printf_hook = (PFfprintf) fprintf; data/silo-llnl-4.10.2.real/src/score/scctl.c:213:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(t, ctime(&tm)); data/silo-llnl-4.10.2.real/src/score/scctla.c:709:19: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (p != NULL) strcpy(p, s); data/silo-llnl-4.10.2.real/src/score/scctla.c:746:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, t); data/silo-llnl-4.10.2.real/src/score/scctla.c:802:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tokbuffer, t); data/silo-llnl-4.10.2.real/src/score/scctla.c:815:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(t, tokbuffer); data/silo-llnl-4.10.2.real/src/score/scctla.c:822:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tokbuffer, t); data/silo-llnl-4.10.2.real/src/score/scctla.c:825:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(t, tokbuffer); data/silo-llnl-4.10.2.real/src/score/scctla.c:864:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tokbuffer, s); data/silo-llnl-4.10.2.real/src/score/scctla.c:870:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(s, s+i+1); data/silo-llnl-4.10.2.real/src/score/scctla.c:873:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s, tokbuffer); data/silo-llnl-4.10.2.real/src/silo/silo.c:391:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(better_s, "%s: ", fname); data/silo-llnl-4.10.2.real/src/silo/silo.c:392:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(better_s + flen, "%s", db_strerror(errorno)); data/silo-llnl-4.10.2.real/src/silo/silo.c:394:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(better_s + flen + elen, ": %s", s); data/silo-llnl-4.10.2.real/src/silo/silo.c:1512:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(&opts[nopts], &args[i][1]); data/silo-llnl-4.10.2.real/src/silo/silo.c:1627:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(list[(*nlist)++], toc->curve_names[i]); data/silo-llnl-4.10.2.real/src/silo/silo.c:1644:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(list[(*nlist)++], toc->var_names[i]); data/silo-llnl-4.10.2.real/src/silo/silo.c:1661:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(list[(*nlist)++], toc->mat_names[i]); data/silo-llnl-4.10.2.real/src/silo/silo.c:1678:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(list[(*nlist)++], toc->matspecies_names[i]); data/silo-llnl-4.10.2.real/src/silo/silo.c:1696:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(list[(*nlist)++], toc->array_names[i]); data/silo-llnl-4.10.2.real/src/silo/silo.c:1713:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(list[(*nlist)++], toc->dir_names[i]); data/silo-llnl-4.10.2.real/src/silo/silo.c:1730:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(list[(*nlist)++], toc->multimesh_names[i]); data/silo-llnl-4.10.2.real/src/silo/silo.c:1747:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(list[(*nlist)++], toc->qmesh_names[i]); data/silo-llnl-4.10.2.real/src/silo/silo.c:1763:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(list[(*nlist)++], toc->ucdmesh_names[i]); data/silo-llnl-4.10.2.real/src/silo/silo.c:1779:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(list[(*nlist)++], toc->ptmesh_names[i]); data/silo-llnl-4.10.2.real/src/silo/silo.c:1796:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(list[(*nlist)++], toc->multivar_names[i]); data/silo-llnl-4.10.2.real/src/silo/silo.c:1812:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (list[(*nlist)++], toc->multimat_names[i]); data/silo-llnl-4.10.2.real/src/silo/silo.c:1828:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (list[(*nlist)++], toc->multimatspecies_names[i]); data/silo-llnl-4.10.2.real/src/silo/silo.c:1846:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(list[(*nlist)++], toc->qvar_names[i]); data/silo-llnl-4.10.2.real/src/silo/silo.c:1862:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(list[(*nlist)++], toc->ucdvar_names[i]); data/silo-llnl-4.10.2.real/src/silo/silo.c:1878:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(list[(*nlist)++], toc->ptvar_names[i]); data/silo-llnl-4.10.2.real/src/silo/silo.c:1894:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(list[(*nlist)++], toc->obj_names[i]); data/silo-llnl-4.10.2.real/src/silo/silo.c:2384:17: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(tmpname, raw_ext, name); data/silo-llnl-4.10.2.real/src/silo/silo.c:2386:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmpname, "%s%s", name, raw_ext); data/silo-llnl-4.10.2.real/src/silo/silo.c:2393:17: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(tmpname, meta_ext, name); data/silo-llnl-4.10.2.real/src/silo/silo.c:2395:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmpname, "%s%s", name, meta_ext); data/silo-llnl-4.10.2.real/src/silo/silo.c:2792:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(SILO_Globals.compressionParams, s); data/silo-llnl-4.10.2.real/src/silo/silo.c:3685:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmp, "'<s>%s'", ss); data/silo-llnl-4.10.2.real/src/silo/silo.c:3961:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(version, SILO_VSTRING); data/silo-llnl-4.10.2.real/src/silo/silo.c:4027:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(version, dbfile->pub.file_lib_version); data/silo-llnl-4.10.2.real/src/silo/silo.c:12199:14: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(s+len, strArray[i]); data/silo-llnl-4.10.2.real/src/silo/silo.c:12664:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmp,pathname); data/silo-llnl-4.10.2.real/src/silo/silo.c:13130:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(tmp,c->name); data/silo-llnl-4.10.2.real/src/silo/silo_f.c:4018:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmpstr, varnm); data/silo-llnl-4.10.2.real/src/silo/silo_json.c:1214:33: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(subnm, "%s[%03d]", lnm, i); data/silo-llnl-4.10.2.real/src/silo/silo_json.c:1224:37: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(subnm, "%s[%03d]", lnm, i); data/silo-llnl-4.10.2.real/src/silo/silo_ns.c:572:13: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(tmp, tmpfmt, ns->embedstrs[theVal]); data/silo-llnl-4.10.2.real/src/silo/silo_ns.c:574:13: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(tmp, tmpfmt, theVal); data/silo-llnl-4.10.2.real/src/silo/silo_ns.c:575:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(retval, tmp); data/silo-llnl-4.10.2.real/src/silo/silo_private.h:393:34: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. #define SW_file_exists(S) (access((S),F_OK)>=0?1:0) data/silo-llnl-4.10.2.real/src/silo/silo_private.h:394:34: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. #define SW_file_readable(S) (access((S),R_OK)>=0?1:0) data/silo-llnl-4.10.2.real/src/silo/silo_win32_compatibility.h:10:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. #define access _access data/silo-llnl-4.10.2.real/src/silo/silo_win32_compatibility.h:13:9: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. #define popen _popen data/silo-llnl-4.10.2.real/src/silo/silo_win32_compatibility.h:15:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define snprintf _snprintf data/silo-llnl-4.10.2.real/src/silo/silo_win32_compatibility.h:15:19: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define snprintf _snprintf data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:176:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(path, npath); data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1483:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(mesh_name, "/state%02d/%s", taurus->state, data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1486:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(mesh_name, "/state%03d/%s", taurus->state, data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1785:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(npath, path); data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1789:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(npath, "%s/%s", opath, path); data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1884:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(path, "/state%02d/%s", taurus->state, data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1888:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(path, "/state%03d/%s", taurus->state, data/silo-llnl-4.10.2.real/src/taurus/taurus.c:293:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(filename, basename); data/silo-llnl-4.10.2.real/src/taurus/taurus.c:295:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "%s%02d", basename, filenumber); data/silo-llnl-4.10.2.real/src/taurus/taurus.c:297:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "%s%03d", basename, filenumber); data/silo-llnl-4.10.2.real/src/taurus/taurus.c:1619:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(taurus->basename, basename); data/silo-llnl-4.10.2.real/src/taurus/taurus.c:1697:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(taurus->title, title); data/silo-llnl-4.10.2.real/src/taurus/taurus.c:2340:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (meshname, taur_var_list[ivar].mesh); data/silo-llnl-4.10.2.real/src/unknown/silo_unknown.c:181:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(ascii, " %s", hierarchy_names[driverId]); data/silo-llnl-4.10.2.real/src/unknown/silo_unknown.c:182:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(tried, ascii); data/silo-llnl-4.10.2.real/src/unknown/silo_unknown.c:221:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(tried, ascii); data/silo-llnl-4.10.2.real/src/unknown/silo_unknown.c:257:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(ascii, " %s", hierarchy_names[driverId]); data/silo-llnl-4.10.2.real/src/unknown/silo_unknown.c:258:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(tried, ascii); data/silo-llnl-4.10.2.real/src/unknown/silo_unknown.c:295:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(tried, ascii); data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:487:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system(syscmd); data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:503:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmpName, "%s_wmrgtree", amrconf.meshName); data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:532:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(lvlMapsName, "%s_wmrgtree_lvlMaps", amrconf.meshName); data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:550:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(chldMapsName, "%s_wmrgtree_chldMaps", amrconf.meshName); data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:610:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmpName, "%s_wmrgtree_lvlRatios", amrconf.meshName); data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:612:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmpName, "%s_wmrgtree_ijkExts", amrconf.meshName); data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:614:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmpName, "%s_wmrgtree_xyzExts", amrconf.meshName); data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:644:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmpName, "%s_wmrgtree_lvlRatios", amrconf.meshName); data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:687:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmpName, "%s_wmrgtree_ijkExts", amrconf.meshName); data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:690:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmpName, "%s_wmrgtree_xyzExts", amrconf.meshName); data/silo-llnl-4.10.2.real/tests/cpz1plt.c:137:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (dirs[i], toc->dir_names [i]); data/silo-llnl-4.10.2.real/tests/group_test.c:335:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "group_rect3d.%s", file_ext); data/silo-llnl-4.10.2.real/tests/group_test.c:353:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "group_curv3d.%s", file_ext); data/silo-llnl-4.10.2.real/tests/group_test.c:371:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "group_ucd3d.%s", file_ext); data/silo-llnl-4.10.2.real/tests/ioperf.c:221:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(plugin_opts_delim, "--%s-args", opts->io_interface); data/silo-llnl-4.10.2.real/tests/ioperf.c:325:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ifacename, opts->io_interface); data/silo-llnl-4.10.2.real/tests/ioperf.c:326:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(testfilename, "iop_test_%s%s.dat", ifacename, data/silo-llnl-4.10.2.real/tests/ioperf.c:352:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(libfilename, "%s/ioperf_%s.so", dirs[d], ifacename); data/silo-llnl-4.10.2.real/tests/ioperf_silo.c:147:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(compstr, "METHOD=%s", argv[i]); data/silo-llnl-4.10.2.real/tests/listtypes.c:175:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(dir_names[i], "%s%s", currentdir, dbtoc->dir_names[i]); data/silo-llnl-4.10.2.real/tests/merge_block.c:201:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (vars[i], toc->multivar_names[i]); data/silo-llnl-4.10.2.real/tests/merge_block.c:214:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (tmpstr, "%s.silo", fileName); data/silo-llnl-4.10.2.real/tests/merge_block.c:600:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (tmpstr, "/domain_%d/%s", j, vars[i]); data/silo-llnl-4.10.2.real/tests/merge_block.c:660:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (tmpstr, "%s_data", vars[i]); data/silo-llnl-4.10.2.real/tests/merge_block.c:783:21: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (files [nFiles], fName); data/silo-llnl-4.10.2.real/tests/multi_file.c:373:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(prefix, "multi_file.dir\\%03d\\%s%d.%s:/block%d/", filenum, basename, filenum, file_ext, i); data/silo-llnl-4.10.2.real/tests/multi_file.c:375:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(prefix, "multi_file.dir/%03d/%s%d.%s:/block%d/", filenum, basename, filenum, file_ext, i); data/silo-llnl-4.10.2.real/tests/multi_file.c:378:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(prefix, "%s%d.%s:/block%d/", basename, filenum, file_ext, i); data/silo-llnl-4.10.2.real/tests/multi_file.c:380:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(names[i], "%smesh1", prefix); data/silo-llnl-4.10.2.real/tests/multi_file.c:384:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(names1[i], "%sd", prefix); data/silo-llnl-4.10.2.real/tests/multi_file.c:385:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(names2[i], "%sp", prefix); data/silo-llnl-4.10.2.real/tests/multi_file.c:386:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(names3[i], "%su", prefix); data/silo-llnl-4.10.2.real/tests/multi_file.c:387:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(names4[i], "%sv", prefix); data/silo-llnl-4.10.2.real/tests/multi_file.c:388:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(names5[i], "%sw", prefix); data/silo-llnl-4.10.2.real/tests/multi_file.c:396:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(names0[i], "%smat1", prefix); data/silo-llnl-4.10.2.real/tests/multi_file.c:408:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(file_ns, "|multi_file.dir\\%%03d\\%%s%%d.%%s|n/36|'%s'|n/36|'%s'", basename, file_ext); data/silo-llnl-4.10.2.real/tests/multi_file.c:410:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(file_ns, "|multi_file.dir/%%03d/%%s%%d.%%s|n/36|'%s'|n/36|'%s'", basename, file_ext); data/silo-llnl-4.10.2.real/tests/multi_file.c:414:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(file_ns, "|%%s%%d.%%s|'%s'|n/36|'%s'", basename, file_ext); data/silo-llnl-4.10.2.real/tests/multi_file.c:427:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "%s_root.%s", basename, file_ext); data/silo-llnl-4.10.2.real/tests/multi_file.c:803:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "multi_file.dir/%03d/%s%d.%s", filenum, basename, filenum, file_ext); data/silo-llnl-4.10.2.real/tests/multi_file.c:805:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "%s%d.%s", basename, filenum, file_ext); data/silo-llnl-4.10.2.real/tests/multi_test.c:836:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "multi_rect2d%s", file_ext); data/silo-llnl-4.10.2.real/tests/multi_test.c:867:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "multi_curv2d%s", file_ext); data/silo-llnl-4.10.2.real/tests/multi_test.c:898:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "multi_point2d%s", file_ext); data/silo-llnl-4.10.2.real/tests/multi_test.c:929:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "multi_rect3d%s", file_ext); data/silo-llnl-4.10.2.real/tests/multi_test.c:960:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "multi_curv3d%s", file_ext); data/silo-llnl-4.10.2.real/tests/multi_test.c:992:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "multi_ucd3d%s", file_ext); data/silo-llnl-4.10.2.real/tests/namescheme.c:116:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(teststr, "%s %s", DBGetName(ns,0), DBGetName(ns,123)); data/silo-llnl-4.10.2.real/tests/namescheme.c:166:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(blockName, DBGetName(ns, 123)); /* filename part */ data/silo-llnl-4.10.2.real/tests/namescheme.c:168:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(blockName, DBGetName(ns2, 123)); /* blockname part */ data/silo-llnl-4.10.2.real/tests/namescheme.c:171:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(blockName, DBGetName(ns, 0)); /* filename part */ data/silo-llnl-4.10.2.real/tests/namescheme.c:173:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(blockName, DBGetName(ns2, 0)); /* blockname part */ data/silo-llnl-4.10.2.real/tests/namescheme.c:176:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(blockName, DBGetName(ns, 287)); /* filename part */ data/silo-llnl-4.10.2.real/tests/namescheme.c:178:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(blockName, DBGetName(ns2, 287)); /* blockname part */ data/silo-llnl-4.10.2.real/tests/pdbtst.c:132:29: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define SC_VSNPRINTF(A,B,C) vsnprintf(A,B,C,ap); data/silo-llnl-4.10.2.real/tests/pdbtst.c:142:15: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define PRINT fprintf data/silo-llnl-4.10.2.real/tests/pdbtst.c:539:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fname, "%s-%s.rs%d", base, tgt, n); data/silo-llnl-4.10.2.real/tests/pdbtst.c:540:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(datfile, "%s-%s.db%d", base, tgt, n);} data/silo-llnl-4.10.2.real/tests/pdbtst.c:543:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. {sprintf(fname, "%s-nat.rs%d", base, n); data/silo-llnl-4.10.2.real/tests/pdbtst.c:544:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(datfile, "%s-nat.db%d", base, n);}; data/silo-llnl-4.10.2.real/tests/pmpio_silo_test_mesh.c:195:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fileName, "silo_%03d.%s", PMPIO_GroupRank(bat, rank), file_ext); data/silo-llnl-4.10.2.real/tests/pmpio_silo_test_mesh.c:318:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(meshBlockNames[i], "silo_%03d.%s:/domain_%03d/qmesh", data/silo-llnl-4.10.2.real/tests/pmpio_silo_test_mesh.c:320:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(velBlockNames[i], "silo_%03d.%s:/domain_%03d/velocity", data/silo-llnl-4.10.2.real/tests/pmpio_silo_test_mesh.c:322:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tempBlockNames[i], "silo_%03d.%s:/domain_%03d/temp", data/silo-llnl-4.10.2.real/tests/point.c:169:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "point2d%s", file_ext); data/silo-llnl-4.10.2.real/tests/point.c:189:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "point3d%s", file_ext); data/silo-llnl-4.10.2.real/tests/point.c:321:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name2, "%s_wghost", name); data/silo-llnl-4.10.2.real/tests/readstuff.c:97:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "multi_rect2d.%s", driverType==DB_PDB?"pdb":"h5"); data/silo-llnl-4.10.2.real/tests/specmix.c:463:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "specmix_quad%s", file_ext); data/silo-llnl-4.10.2.real/tests/specmix.c:470:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "specmix_ucd%s", file_ext); data/silo-llnl-4.10.2.real/tests/std.c:68:13: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. int n = sscanf(tok, #A"=%d", &driver_ints[driver_nints]);\ data/silo-llnl-4.10.2.real/tests/testall.c:3312:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "rect2d.%s", suffix); data/silo-llnl-4.10.2.real/tests/testall.c:3321:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "curv2d.%s", suffix); data/silo-llnl-4.10.2.real/tests/testall.c:3330:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "ucd2d.%s", suffix); data/silo-llnl-4.10.2.real/tests/testall.c:3339:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "rect3d.%s", suffix); data/silo-llnl-4.10.2.real/tests/testall.c:3348:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (filename, "curv3d.%s", suffix) ; data/silo-llnl-4.10.2.real/tests/testall.c:3357:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "ucd3d.%s", suffix); data/silo-llnl-4.10.2.real/tests/testall.c:3366:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "poly3d.%s", suffix); data/silo-llnl-4.10.2.real/tests/testall.c:3375:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename, "carray.%s", suffix); data/silo-llnl-4.10.2.real/tests/testall.c:3384:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (filename, "curve.%s", suffix); data/silo-llnl-4.10.2.real/tests/testpdb.c:169:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(str, "%s->name", name); data/silo-llnl-4.10.2.real/tests/testpdb.c:175:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(str, "%s->comp_names", name); data/silo-llnl-4.10.2.real/tests/testpdb.c:183:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(str, "%s->comp_names[1]", name); data/silo-llnl-4.10.2.real/tests/testpdb.c:189:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(str, "%s->comp_names[1][2:4]", name); data/silo-llnl-4.10.2.real/tests/testpdb.c:264:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(group->comp_names[i], comp_names[i]); data/silo-llnl-4.10.2.real/tests/testpdb.c:266:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(group->pdb_names[i], pdb_names[i]); data/silo-llnl-4.10.2.real/tests/testpdb.c:269:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(group->type, type); data/silo-llnl-4.10.2.real/tests/testpdb.c:271:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(group->name, name); data/silo-llnl-4.10.2.real/tools/browser/array.c:576:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (buf, "%s(%d value%s omitted)%s", data/silo-llnl-4.10.2.real/tools/browser/array.c:905:25: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf,"%s(%d value%s omitted)%s", data/silo-llnl-4.10.2.real/tools/browser/array.c:946:25: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "%s(%d value%s omitted)%s", data/silo-llnl-4.10.2.real/tools/browser/array.c:1312:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (buf, self->ascii_dims); data/silo-llnl-4.10.2.real/tools/browser/browser.c:543:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (s, "%s%s%s", dir, strcmp(dir,"/")?"/":"", toc[i].name); data/silo-llnl-4.10.2.real/tools/browser/browser.c:658:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (tmp, "$diff_int8_%s", suffix); data/silo-llnl-4.10.2.real/tools/browser/browser.c:663:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (tmp, "$diff_short_%s", suffix); data/silo-llnl-4.10.2.real/tools/browser/browser.c:668:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (tmp, "$diff_int_%s", suffix); data/silo-llnl-4.10.2.real/tools/browser/browser.c:673:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (tmp, "$diff_long_%s", suffix); data/silo-llnl-4.10.2.real/tools/browser/browser.c:678:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (tmp, "$diff_float_%s", suffix); data/silo-llnl-4.10.2.real/tools/browser/browser.c:683:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (tmp, "$diff_double_%s", suffix); data/silo-llnl-4.10.2.real/tools/browser/browser.c:688:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (tmp, "$diff_llong_%s", suffix); data/silo-llnl-4.10.2.real/tools/browser/browser.c:1170:5: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, fmt, ap); data/silo-llnl-4.10.2.real/tools/browser/browser.c:1336:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (HistoryFile, "%s/%s", passwd->pw_dir, HISTORY_FILE); data/silo-llnl-4.10.2.real/tools/browser/browser.c:1356:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(HistoryFile, "%s\\%s", userhome, HISTORY_FILE); data/silo-llnl-4.10.2.real/tools/browser/browser.c:1383:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(init_file_buf, "%s/%s", passwd->pw_dir, INIT_FILE); data/silo-llnl-4.10.2.real/tools/browser/browser.c:1384:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(init_file_buf, F_OK)>=0) init_file = init_file_buf; data/silo-llnl-4.10.2.real/tools/browser/browser.c:1398:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(init_file_buf, "%s\\%s", userhome, INIT_FILE); data/silo-llnl-4.10.2.real/tools/browser/browser.c:1399:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(init_file_buf, F_OK)>=0) init_file = init_file_buf; data/silo-llnl-4.10.2.real/tools/browser/browser.c:1406:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(init_file_buf, PUBLIC_INIT_FILE); data/silo-llnl-4.10.2.real/tools/browser/browser.c:1407:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(init_file_buf, F_OK)>=0) init_file = init_file_buf; data/silo-llnl-4.10.2.real/tools/browser/file.c:82:13: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. int n = sscanf(tmp, #A"=%d", &driver_ints[driver_nints]);\ data/silo-llnl-4.10.2.real/tools/browser/file.c:621:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(new_names[i], obj->comp_names[i]); data/silo-llnl-4.10.2.real/tools/browser/file.c:622:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(new_names[i], suffix); data/silo-llnl-4.10.2.real/tools/browser/file.c:912:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (obj->pdb_names[i]+4, s); data/silo-llnl-4.10.2.real/tools/browser/file.c:1109:11: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf (aname, fmt, i); data/silo-llnl-4.10.2.real/tools/browser/file.c:1125:11: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf (aname, fmt, i); data/silo-llnl-4.10.2.real/tools/browser/file.c:1254:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (aname, "segdata(id=%05d%s)", segid, segid_label); data/silo-llnl-4.10.2.real/tools/browser/file.c:1269:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (aname, "segfracs(id=%05d%s)", segid, segid_label); data/silo-llnl-4.10.2.real/tools/browser/file.c:2218:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (buf, "%s/%s", obj_name(_self), name); data/silo-llnl-4.10.2.real/tools/browser/file.c:2319:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fullname, "/%s", name); data/silo-llnl-4.10.2.real/tools/browser/file.c:2321:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fullname, "%s/%s", cwd, name); data/silo-llnl-4.10.2.real/tools/browser/file.c:2835:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fullname, cwd); data/silo-llnl-4.10.2.real/tools/browser/file.c:2836:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(fullname, basename); data/silo-llnl-4.10.2.real/tools/browser/file.c:3032:21: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(tmp, a_cwd); data/silo-llnl-4.10.2.real/tools/browser/file.c:3033:21: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(tmp, atoc[i].name); data/silo-llnl-4.10.2.real/tools/browser/func.c:105:14: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. extern FILE *popen (const char *, const char *); data/silo-llnl-4.10.2.real/tools/browser/func.c:154:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (buf+at, "%s%d", at?", ":"", num_int (argv[i])); data/silo-llnl-4.10.2.real/tools/browser/func.c:162:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (buf+at, s); data/silo-llnl-4.10.2.real/tools/browser/func.c:355:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (buf, "diff: value of `%s' is inappropriate: ", ascii_name); data/silo-llnl-4.10.2.real/tools/browser/func.c:633:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(header, i?"\n":""); data/silo-llnl-4.10.2.real/tools/browser/func.c:637:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(header+strlen(header), "%-*s%-*s%*s%s\n", data/silo-llnl-4.10.2.real/tools/browser/func.c:642:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(header+strlen(header), "Differences between %s and %s\n", data/silo-llnl-4.10.2.real/tools/browser/func.c:1010:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "help %s", obj_name(sym)); data/silo-llnl-4.10.2.real/tools/browser/func.c:1078:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "help %s", toc[i].name); data/silo-llnl-4.10.2.real/tools/browser/func.c:1093:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "help %s", HelpFuncToc[i].name); data/silo-llnl-4.10.2.real/tools/browser/func.c:1108:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "help %s", HelpOpToc[i].name); data/silo-llnl-4.10.2.real/tools/browser/func.c:1123:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "help %s", HelpVarToc[i].name); data/silo-llnl-4.10.2.real/tools/browser/func.c:1485:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "%s(s)", ObjTypeName[toc[i].type]); data/silo-llnl-4.10.2.real/tools/browser/func.c:1704:17: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (NULL==(f=popen(command, fmode))) { data/silo-llnl-4.10.2.real/tools/browser/func.c:2364:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (buf, "%s_int", argv[0]->pub.cls->name); data/silo-llnl-4.10.2.real/tools/browser/func.c:2368:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (buf, "%s_fp", argv[0]->pub.cls->name); data/silo-llnl-4.10.2.real/tools/browser/lex.c:392:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(f->s, temp); data/silo-llnl-4.10.2.real/tools/browser/lex.c:861:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (lexeme) strcpy (f->lexeme, lexeme); data/silo-llnl-4.10.2.real/tools/browser/output.c:260:7: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf (buf, fmt, ap); data/silo-llnl-4.10.2.real/tools/browser/output.c:388:4: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf (buf, fmt, ap); data/silo-llnl-4.10.2.real/tools/browser/output.c:856:4: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf (buf, fmt, ap); data/silo-llnl-4.10.2.real/tools/browser/prim.c:706:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "fmt_%s", obj_name(_self)); data/silo-llnl-4.10.2.real/tools/browser/prim.c:708:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, s); data/silo-llnl-4.10.2.real/tools/browser/prim.c:725:25: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, s); data/silo-llnl-4.10.2.real/tools/browser/stc.c:555:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (buf, "%s(s)", ObjTypeName[dir->toc[i].type]); data/silo-llnl-4.10.2.real/tools/browser/stc.c:898:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (buf, "%s/%s", obj_name(wdata->a_sdo), a_toc[i].name); data/silo-llnl-4.10.2.real/tools/browser/stc.c:903:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (buf, "%s/%s", obj_name(wdata->b_sdo), b_toc[j].name); data/silo-llnl-4.10.2.real/tools/browser/stc.c:922:17: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (cwd, a_toc[i].name); data/silo-llnl-4.10.2.real/tools/browser/stc.c:926:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (buf, "%s/%s", obj_name(wdata->a_sdo), a_toc[i].name); data/silo-llnl-4.10.2.real/tools/browser/stc.c:931:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (buf, "%s/%s", obj_name(wdata->b_sdo), b_toc[j].name); data/silo-llnl-4.10.2.real/tools/browser/switch.c:168:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(fulldoc, doc_string); data/silo-llnl-4.10.2.real/tools/browser/switch.c:250:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buffer, sw->short_name); data/silo-llnl-4.10.2.real/tools/browser/switch.c:254:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buffer, name); data/silo-llnl-4.10.2.real/tools/browser/switch.c:262:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buffer, sw->long_name); data/silo-llnl-4.10.2.real/tools/browser/switch.c:266:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buffer, name); data/silo-llnl-4.10.2.real/tools/browser/switch.c:296:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(synopsis, "usage: %s [SWITCHES] [--] [FILES]", base); data/silo-llnl-4.10.2.real/tools/browser/switch.c:413:5: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, fmt, ap); data/silo-llnl-4.10.2.real/tools/browser/sym.c:581:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fullname+1, name); data/silo-llnl-4.10.2.real/tools/browser/sym.c:630:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fullname+1, name); data/silo-llnl-4.10.2.real/tools/browser/sym.c:663:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fullname+1, name); data/silo-llnl-4.10.2.real/tools/mapred/stream_silo.c:105:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmp, "%s%1d=%f", ucdv->name, j, vals[j]); data/silo-llnl-4.10.2.real/tools/mapred/stream_silo.c:133:25: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmp, "%s%1d=%f", ucdv->name, j, vals[j]); data/silo-llnl-4.10.2.real/tools/mapred/stream_silo.c:231:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(origdir_names[i], toc->dir_names[i]); data/silo-llnl-4.10.2.real/tools/mapred/stream_silo.c:276:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(filename, argv[i]); data/silo-llnl-4.10.2.real/tools/mapred/stream_silo.c:282:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(varname, argv[i]); data/silo-llnl-4.10.2.real/tools/python/pydbfile.cpp:760:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s, "<DBfile object, filename='%s'>", obj->db->pub.name); data/silo-llnl-4.10.2.real/tools/python/pydbtoc.cpp:79:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmp, "n%s = %d\n", #nm, toc->n ## nm); \ data/silo-llnl-4.10.2.real/tools/python/pydbtoc.cpp:81:16: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). if (s) strcat(s, tmp); \ data/silo-llnl-4.10.2.real/tools/python/pydbtoc.cpp:83:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmp, "%s_names = (", #nm); \ data/silo-llnl-4.10.2.real/tools/python/pydbtoc.cpp:85:16: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). if (s) strcat(s, tmp); \ data/silo-llnl-4.10.2.real/tools/python/pydbtoc.cpp:89:20: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). if (s) strcat(s, toc->nm ## _names[i]); \ data/silo-llnl-4.10.2.real/tools/python/pydbtoc.cpp:93:24: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). if (s) strcat(s, sep); \ data/silo-llnl-4.10.2.real/tools/python/pydbtoc.cpp:97:16: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). if (s) strcat(s, term); \ data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:225:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(value, "%s", ((char*)comp)); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:239:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(value, "%s", valStr.c_str()); data/silo-llnl-4.10.2.real/tools/silex/SiloValueView.cpp:132:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(str, "string: %s", ((char*)var)); data/silo-llnl-4.10.2.real/tools/silock/silock.c:156:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(lastDir, theDir); data/silo-llnl-4.10.2.real/tools/silock/silock.c:157:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(lastVar, varName); data/silo-llnl-4.10.2.real/tools/silock/silock.c:334:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dirNames[i], toc->dir_names[i]); data/silo-llnl-4.10.2.real/tests/ioperf.c:176:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rnum = random(); data/silo-llnl-4.10.2.real/tests/largefile.c:216:5: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(0xBabeFace); data/silo-llnl-4.10.2.real/tests/pmpio_hdf5_test.c:181:5: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(rank*13371); data/silo-llnl-4.10.2.real/tools/browser/output.c:419:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((s=getenv("COLUMNS")) && isdigit(*s)) { data/silo-llnl-4.10.2.real/tools/browser/output.c:422:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((s=getenv("LINES")) && isdigit(*s)) { data/silo-llnl-4.10.2.real/src/debug/silo_debug.c:136:38: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). else if (NULL == (dbfile->file = fopen(name, "w"))) { data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:88:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *f_ale3d_name[DB_NFILES]; data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:798:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *list, _work[256], *work, *item; data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:924:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(dbfile->pub), f_ale3d_cb + id, sizeof(DBfile_pub)); data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:1175:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *s, *t, work[1024]; data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:1375:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(path, "/node"); data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:1378:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(path, "/brick"); data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:1381:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(path, "/shell"); data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:1384:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(path, "/other"); data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:1387:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(path, "/brick/hydro"); data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:1390:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(path, "/brick/hydro"); data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:1393:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(path, "/shell/lower"); data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:1396:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(path, "/shell/middle"); data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:1399:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(path, "/shell/upper"); data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:1402:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(path, "/shell/other"); data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:1912:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *s, *t, *s_data[16], work[256]; data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:1988:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mesg[64]; data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:2133:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char work[256], *s; data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:2187:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char work[256], *s; data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:2250:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mesg[1024]; data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:2260:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(f_ale3d_cb + id, &(dbfile->pub), sizeof(DBfile_pub)); data/silo-llnl-4.10.2.real/src/filters/f_sample.c:104:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *f_debug_name[DB_NFILES]; /*saved filter names */ data/silo-llnl-4.10.2.real/src/filters/f_sample.c:171:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(dbfile->pub), f_debug_cb + id, sizeof(DBfile_pub)); data/silo-llnl-4.10.2.real/src/filters/f_sample.c:518:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mesg[1024]; data/silo-llnl-4.10.2.real/src/filters/f_sample.c:546:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(f_debug_cb + id, &(dbfile->pub), sizeof(DBfile_pub)); data/silo-llnl-4.10.2.real/src/fpzip/read.cpp:323:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* file = fopen(path, "rb"); data/silo-llnl-4.10.2.real/src/fpzip/read.h:32:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buffer[FPZIP_BLOCK_SIZE]; data/silo-llnl-4.10.2.real/src/fpzip/write.cpp:317:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* file = fopen(path, "wb"); data/silo-llnl-4.10.2.real/src/fpzip/write.h:34:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buffer[FPZIP_BLOCK_SIZE]; data/silo-llnl-4.10.2.real/src/hdf5_drv/H5FDsilo.c:201:41: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define HDopen(S,F,M) open(S,F|_O_BINARY,M) data/silo-llnl-4.10.2.real/src/hdf5_drv/H5FDsilo.c:203:41: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define HDopen(S,F,M) open(S,F,M) data/silo-llnl-4.10.2.real/src/hdf5_drv/H5FDsilo.c:228:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char tmp[32]; data/silo-llnl-4.10.2.real/src/hdf5_drv/H5FDsilo.c:245:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "Unknown (%d)", (int) m); data/silo-llnl-4.10.2.real/src/hdf5_drv/H5FDsilo.c:253:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[256]; \ data/silo-llnl-4.10.2.real/src/hdf5_drv/H5FDsilo.c:737:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char*)block->buf+off, srcbuf, size); data/silo-llnl-4.10.2.real/src/hdf5_drv/H5FDsilo.c:770:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dstbuf, (char*)block->buf+off, size); data/silo-llnl-4.10.2.real/src/hdf5_drv/H5FDsilo.c:1309:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, &file->block_size, sizeof(hsize_t)); data/silo-llnl-4.10.2.real/src/hdf5_drv/H5FDsilo.c:1330:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char x[8]; data/silo-llnl-4.10.2.real/src/hdf5_drv/H5FDsilo.c:1344:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(x, buf, 8); data/silo-llnl-4.10.2.real/src/hdf5_drv/H5FDsilo.c:1578:22: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* logf = fopen(file->log_name, "w"); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:293:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char xvarname[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:294:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char yvarname[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:295:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:296:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char xlabel[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:297:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ylabel[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:298:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char xunits[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:299:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char yunits[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:300:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reference[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:318:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char units[3][256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:319:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char labels[3][256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:320:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:321:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char typeflags[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:322:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bndids[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:323:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char coeffs[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:324:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zonel_name[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:325:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bndnames[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:326:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mrgtree_name[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:329:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char alt_nodenum_vars[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:344:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:345:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char units[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:346:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:347:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vals[MAX_VARS][256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:348:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char meshname[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:349:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char region_pnames[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:364:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char typeflags[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:365:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char leftids[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:366:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rightids[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:367:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char xform[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:368:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zonelist[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:369:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char regnames[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:370:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zonenames[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:371:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char alt_zonenum_vars[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:377:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:378:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char types[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:379:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char defns[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:380:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char guihides[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:385:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char coord[3][256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:406:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[3][256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:407:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char units[3][256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:408:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mrgtree_name[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:409:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ghost_node_labels[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:410:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ghost_zone_labels[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:411:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char alt_nodenum_vars[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:412:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char alt_zonenum_vars[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:417:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_VARS][256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:418:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mixed_value[MAX_VARS][256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:419:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char meshid[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:438:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:439:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char units[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:440:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char region_pnames[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:449:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char coord[3][256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:463:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char facelist[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:464:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zonelist[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:465:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gnodeno[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:468:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[3][256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:469:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char units[3][256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:470:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char phzonelist[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:471:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mrgtree_name[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:475:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ghost_node_labels[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:476:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char alt_nodenum_vars[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:481:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_VARS][256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:482:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mixed_value[MAX_VARS][256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:483:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char meshid[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:499:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:500:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char units[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:501:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char region_pnames[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:515:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nodelist[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:516:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shapecnt[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:517:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shapesize[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:518:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char typelist[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:519:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char types[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:520:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zoneno[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:532:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nodelist[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:533:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shapecnt[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:534:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shapesize[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:535:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shapetype[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:536:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gzoneno[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:538:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ghost_zone_labels[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:539:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char alt_zonenum_vars[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:551:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nodecnt[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:552:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nodelist[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:553:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char extface[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:554:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char facecnt[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:555:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char facelist[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:556:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gzoneno[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:558:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ghost_zone_labels[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:559:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char alt_zonenum_vars[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:573:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char meshid[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:574:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char matlist[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:575:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char matnos[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:576:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mix_vf[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:577:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mix_next[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:578:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mix_mat[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:579:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mix_zone[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:580:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char matnames[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:581:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char matcolors[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:595:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char meshtypes[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:596:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char meshnames[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:597:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char extents[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:598:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zonecounts[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:599:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char has_external_zones[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:601:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char groupings[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:602:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char groupnames[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:603:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mrgtree_name[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:607:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file_ns_name[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:608:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char block_ns_name[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:610:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char empty_list[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:613:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char alt_nodenum_vars[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:614:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char alt_zonenum_vars[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:624:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char meshtypes[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:625:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nneighbors[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:626:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char neighbors[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:627:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char back[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:628:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lnodelists[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:629:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nodelists[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:630:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lzonelists[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:631:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zonelists[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:645:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vartypes[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:646:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char varnames[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:647:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char extents[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:648:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char region_pnames[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:649:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mmesh_name[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:653:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file_ns_name[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:654:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char block_ns_name[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:656:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char empty_list[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:673:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char matnames[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:674:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char matnos[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:675:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mixlens[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:676:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char matcounts[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:677:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char matlists[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:679:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char material_names[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:680:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mat_colors[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:681:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mmesh_name[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:682:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file_ns_name[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:683:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char block_ns_name[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:684:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char empty_list[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:700:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char specnames[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:701:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nmatspec[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:702:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char matname[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:703:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char species_names[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:704:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char speccolors[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:705:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file_ns_name[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:706:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char block_ns_name[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:707:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char empty_list[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:722:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char matname[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:723:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char speclist[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:724:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nmatspec[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:725:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char species_mf[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:726:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mix_speclist[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:727:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char specnames[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:728:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char speccolors[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:746:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char coord[3][256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:747:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[3][256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:748:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char units[3][256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:749:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gnodeno[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:750:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mrgtree_name[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:751:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ghost_node_labels[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:753:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char alt_nodenum_vars[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:771:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char meshid[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:772:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:773:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char units[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:774:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[MAX_VARS][256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:775:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char region_pnames[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:786:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char values[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:787:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char elemnames[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:788:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char elemlengths[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:798:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char src_mesh_name[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:801:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char n_scalars[256]; /* scalar data for a node */ data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:802:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char n_name[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:803:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char n_names[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:804:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char n_maps_name[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:805:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char n_seg_ids[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:806:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char n_seg_lens[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:807:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char n_seg_types[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:808:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char n_children[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:810:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mrgvar_onames[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:811:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mrgvar_rnames[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:818:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char groupel_types[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:819:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char segment_lengths[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:820:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char segment_ids[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:821:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char segment_data[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:822:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char frac_lengths[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:823:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char segment_fracs[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:831:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mrgt_name[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:832:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reg_pnames[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:833:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char compnames[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:834:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[MAX_VARS][256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:890:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _fullname[256]; /*name for repeated members*/ \ data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:900:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. _size = sprintf(_fullname, "%d", _j); \ data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:1184:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullmname[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:1185:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullzlname[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:1225:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullname[256], fullmname[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:1249:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zl->nodelist, nodelist, snodelist); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:1271:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullmname[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:1272:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullzlname[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:1297:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullmname[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:1706:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char retval[1024]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:1707:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char totfmtstr[1024]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:3163:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chararray[32]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:3590:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:3999:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. db_hdf5_compname(DBfile_hdf5 *dbfile, char name[8]/*out*/) data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:4035:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "#%06d", nlinks); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:4267:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:4446:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cwgname[4096]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:4447:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char result[4096]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5293:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hdf5VString[64]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5349:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(hdf5VString, "hdf5-%d.%d.%d", majno, minno, relno); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5413:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[4096]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5415:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "Internal Silo error: %d objects left open in file: ", noo); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5424:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[256], tmp[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5426:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "\"%.235s\" (id=%d), ", name, ooids[i]); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5746:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(dotdot, "/.."); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:6067:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mem_value, file_value, H5Tget_size(atype)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:6075:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cname[8]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:6146:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dstcwg[256], srccwg[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:6449:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newretval, pretval, db_GetMachDataSize(datatype)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:6776:29: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(object+moffset, &obj->h5_vals[obj->h5_offs[j]], sizeof(dummy)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:6801:29: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(object+moffset, &obj->h5_vals[obj->h5_offs[j]], sizeof(dummy)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:6826:29: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(object+moffset, &obj->h5_vals[obj->h5_offs[j]], sizeof(dummy)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:6893:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char varname[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:6979:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&obj->h5_vals[obj->h5_offs[i]], data, totsize * db_GetMachDataSize(datatype)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:7880:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mem_value, file_value, H5Tget_size(atype)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:7895:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mem_value, file_value, H5Tget_size(atype)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:7910:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mem_value, file_value, H5Tget_size(atype)); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:10696:48: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. PrepareForUcdvarDecompression(DBfile *_dbfile, char const *varname, data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:10697:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const *meshname, char valnames[MAX_VARS][256], int nvals) data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:10697:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const *meshname, char valnames[MAX_VARS][256], int nvals) data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:14770:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[1024]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:15558:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpname[256]; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5_private.h:82:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *dsettab[NDSETTAB]; /*circular buffer of datasets */ data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5_private.h:83:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char compname[NDSETTAB][32]; /*component names for datasets */ data/silo-llnl-4.10.2.real/src/hzip/hzmap.h:52:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&u, &i, sizeof(i)); data/silo-llnl-4.10.2.real/src/hzip/ibstream.h:72:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(byte, ptr, size); data/silo-llnl-4.10.2.real/src/hzip/obstream.h:78:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, byte, size); data/silo-llnl-4.10.2.real/src/netcdf/api.c:126:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err_string[256]; data/silo-llnl-4.10.2.real/src/netcdf/api.c:496:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(err_string, data/silo-llnl-4.10.2.real/src/netcdf/api.c:523:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(err_string, data/silo-llnl-4.10.2.real/src/netcdf/netcdf.c:122:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char silo_err[256]; data/silo-llnl-4.10.2.real/src/netcdf/netcdf.c:571:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&local_sink[isink], &local_source[isrc], count[0] * lenel); /*OK*/ data/silo-llnl-4.10.2.real/src/netcdf/netcdf.c:665:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char whatami[32]; data/silo-llnl-4.10.2.real/src/netcdf/obj.c:128:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *s, *name, compnames[512]; data/silo-llnl-4.10.2.real/src/netcdf/obj.c:129:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char delim[2]; data/silo-llnl-4.10.2.real/src/netcdf/obj.c:216:41: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. *cpp = (char *)SO_GetComponent(sid, compids[i], data/silo-llnl-4.10.2.real/src/netcdf/obj.c:361:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(var, &entid, sizeof(int)); data/silo-llnl-4.10.2.real/src/netcdf/obj.c:489:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(var, &entid, sizeof(int)); data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf.c:67:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *_valstr[10] = data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf.c:73:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *_mixvalstr[10] = data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf.c:307:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[256], str2[256], *name; data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf.c:383:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *name, oname[128]; data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf.c:692:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpstr[512]; data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf.c:730:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(tmpstr, "_data"); data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf.c:827:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tmpnames, delim[2], *s, *name; data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf.c:1147:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpstr[256]; data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf.c:1204:13: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(tmpstr, "_data"); data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf_private.h:78:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const *name[80]; /* Component name */ data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf_private.h:81:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char alloced[80]; /* Sentinel: 1 == space already alloc'd */ data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf_private.h:174:32: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. #define OBJDEF_DECL static char comp_names[1024], *cdelim=";"; \ data/silo-llnl-4.10.2.real/src/pdb/detect.c:237:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. union ucf {unsigned char c[32]; float f[2];} bofa, bofb, bofc; data/silo-llnl-4.10.2.real/src/pdb/detect.c:238:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. union ucd {unsigned char c[32]; double d[2];} boda, bodb, bodc; data/silo-llnl-4.10.2.real/src/pdb/detect.c:342:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char int_order[80]; data/silo-llnl-4.10.2.real/src/pdb/detect.c:405:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char c[32]; data/silo-llnl-4.10.2.real/src/pdb/detect.c:453:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(int_order, "REVERSE_ORDER"); data/silo-llnl-4.10.2.real/src/pdb/detect.c:455:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(int_order, "NORMAL_ORDER"); data/silo-llnl-4.10.2.real/src/pdb/pdb.c:102:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lite_PD_err[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdb.c:195:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(lite_PD_err, "ERROR: DEFINITION FAILED - PD_DEFNCV\n"); data/silo-llnl-4.10.2.real/src/pdb/pdb.c:284:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAXLINE], *token; data/silo-llnl-4.10.2.real/src/pdb/pdb.c:397:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). switch (atoi(token)) { data/silo-llnl-4.10.2.real/src/pdb/pdb.c:465:21: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). file->chrtaddr = atol(token); data/silo-llnl-4.10.2.real/src/pdb/pdb.c:472:21: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). file->symtaddr = atol(token); data/silo-llnl-4.10.2.real/src/pdb/pdb.c:627:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[MAXLINE], fullpath[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdb.c:688:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullpath[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdb.c:826:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *lname, fullpath[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdb.c:908:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expr[MAXLINE], index[MAXLINE], hname[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdb.c:923:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(expr, "%ld:%ld:%ld,", start, stop, step); data/silo-llnl-4.10.2.real/src/pdb/pdb.c:986:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bf[MAXLINE], fullpath[MAXLINE], *lname; data/silo-llnl-4.10.2.real/src/pdb/pdb.c:1134:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdb.c:1332:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(lite_PD_err, "ERROR: CAN'T HANDLE PRIMITIVE TYPE - PD_DEFSTR\n"); data/silo-llnl-4.10.2.real/src/pdb/pdb.c:1387:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(lite_PD_err, "BAD CAST CONTROLLER - PD_CAST"); data/silo-llnl-4.10.2.real/src/pdb/pdb.c:1657:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bf[MAXLINE], *lname; data/silo-llnl-4.10.2.real/src/pdb/pdb.h:182:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. {char c, s[MAXLINE]; \ data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:85:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:91:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(lite_PD_err, "ERROR: BAD FILE ID - PD_CD\n"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:165:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pattern[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:173:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(lite_PD_err, "ERROR: BAD FILE ID - PD_LS\n"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:178:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(lite_PD_err, "ERROR: LAST ARGUMENT NULL - PD_LS\n"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:191:44: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (strcmp(lite_PD_pwd(file), "/") == 0) strcpy(pattern, "/*"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:198:11: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. else strcat(pattern, "/*"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:211:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(pattern, "/*"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:329:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cwd[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:334:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(lite_PD_err, "ERROR: BAD FILE ID - PF_PWD\n"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:374:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char outname[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:376:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpstr[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:459:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAXLINE], head[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:466:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(lite_PD_err, "ERROR: BAD FILE ID - PD_MKDIR\n"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:471:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(lite_PD_err, "ERROR: DIRECTORY NAME NULL - PD_MKDIR\n"); data/silo-llnl-4.10.2.real/src/pdb/pdbio.c:68:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char Pbuffer[LRG_TXT_BUFFER]; data/silo-llnl-4.10.2.real/src/pdb/pdbx.c:86:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullname[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdconv.c:984:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*out, *in, nitems*outbytes); data/silo-llnl-4.10.2.real/src/pdb/pdconv.c:1024:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*out, *in, nbytes); data/silo-llnl-4.10.2.real/src/pdb/pdconv.c:1469:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:169:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char local[LRG_TXT_BUFFER]; data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:219:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char infor[MAXLINE], *p; data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:499:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *nxt, type[MAXLINE], *pbf; data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:649:52: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (token != NULL) file->default_offset = atoi(token); data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:658:52: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (token != NULL) pa->struct_alignment = atoi(token); data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:753:49: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (token != NULL) file->major_order = atoi(token); data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:766:52: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (token != NULL) file->system_version = atoi(token); data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:812:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *token, *type, delim[10]; data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:818:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(delim, "%c\n", dc); data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:1537:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outfor[MAXLINE], *p; data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:1608:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(outfor, "%ld\001%ld\001\n", float_bias, double_bias); data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:1712:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bf[1]; data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:1721:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(lite_PD_err, "ERROR: FSEEK FAILED - _PD_EXTEND_FILE"); data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:1728:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(lite_PD_err, "ERROR: CAN'T SET FILE SIZE - _PD_EXTEND_FILE"); data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:1890:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(lite_PD_err, "ERROR: BAD BLOCK LIST - _PD_WR_SYMT\n"); data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:1980:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char al[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:2176:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:91:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *t, *p, c, bf[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:133:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *token, bf[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:162:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *pt, *token, bf[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:200:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *token, *maxs, bf[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:212:26: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). mini = flag ? defoff : atol(token); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:213:10: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). leng = atol(maxs) - atol(token) + 1L; data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:213:23: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). leng = atol(maxs) - atol(token) + 1L; data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:216:22: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). leng = flag ? 1L : atol(token); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:256:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *token, bf[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:263:19: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((acc *= atol(token)) <= 0) return(-1L); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:421:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *token, bf[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:454:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *token, bf[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:491:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *token, name[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:535:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:554:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char t[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:589:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char bf[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:597:17: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). pi->nitems = atol(token); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:607:19: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). pi->addr = atol(token); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:610:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). else pi->flag = atoi(token); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:653:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char head[MAXLINE], expr[MAXLINE], tail[MAXLINE], bf[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:676:14: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). imin = atol(token); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:677:14: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). imax = atol(smax); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:678:33: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (sinc != NULL) istep = atol(sinc); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:136:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char intype[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:153:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:158:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *v[MAXPARSEDEPTH]; /* parser value stack */ data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:175:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char text[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:176:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char msg[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:178:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char outtype[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:593:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *type, t[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:692:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char t[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:739:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char t[MAXLINE], s[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:836:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char t[MAXLINE], s[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:882:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char t[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:991:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAXLINE], c; data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:1774:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *end, s[MAXLINE], *tok; data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:2102:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "%ld", num_val); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:2108:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "%ld", _PD_do_digress(pvt[-0])); data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:120:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *str_stack[1000] ; data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:168:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expr[MAXLINE], index[MAXLINE], hname[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:186:26: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (start == stop) sprintf(expr, "%ld,", start); data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:187:28: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else if (step <= 1L) sprintf(expr, "%ld:%ld,", start, stop); data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:188:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(expr, "%ld:%ld:%ld,", start, stop, step); data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:248:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAXLINE], *expr; data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:349:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bf[MAXLINE], *pv, *litype=NULL, *lotype, *svr, **lvr; data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:451:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pv, ad.memaddr, nitems*bytepitem); data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:613:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(bf, "UNDECIDABLE CASE - _PD_RD_SYMENT"); data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:912:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *type, bf2[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:1123:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:1170:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:1210:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAXLINE], *token; data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:1218:17: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). else start = atol(token); data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:1222:16: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). else stop = atol(token); data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:1226:16: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). else step = atol(token); data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:1349:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAXLINE], *expr; data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:1437:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bf[MAXLINE], *litype, *lotype, *svr, *ttype; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:257:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _outname[MAXLINE]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:628:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err_str[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:652:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:686:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:969:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tname[256], *lit; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:1031:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *iptr = atoi(lit); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:1075:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *iptr = atoi(lit); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:1144:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(local_c, *var, num * size); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:1675:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAXNAME]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:1734:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *_valstr[10] = data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:1740:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *_mixvalstr[10] = data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:1747:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *_ptvalstr[10] = data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:2329:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(malloc_out, score_out, *num * sizeof(char *)); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:2364:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpstr[1024]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:2466:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newname[MAXNAME]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:2721:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[128]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:3154:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:3360:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:3446:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpstr[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:3489:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(tmpstr, "_data"); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:3555:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *s, delim[2], *name_vector = NULL; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:3793:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tmpnames, *tmpdefns, tmp[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:4076:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256], *nlsname = 0, zlsname = 0; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:4080:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpn[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:4805:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:5113:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:5178:10: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(tmp, "_data"); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:5609:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:5664:11: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(tmp, "_data"); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:5836:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:5874:11: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(tmp, "_data"); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:6400:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type_name[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:6493:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256], *ctype; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:6638:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_message[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:7102:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:7133:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(tmp, "_data"); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:7259:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:8469:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpn[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:9385:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *datatype_str, tmp[1024]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:9403:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "coord%d", i); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:9598:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[1024]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:9622:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "%d_data", i); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:9756:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[1024]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:9795:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "coord%d", i); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:9988:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *suffix, *datatype_str, tmp1[1024], tmp2[1024]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:10104:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp1, "value%d", i); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:10115:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp1, "mixed_value%d", i); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:10361:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *suffix, *datatype_str, tmp1[256], tmp2[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:10402:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp1, "value%d", i); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:10636:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:10662:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "coord%d", i); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:10855:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char myComponName[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:10856:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char parentComponName[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:10858:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(myComponName, "coord%d", i); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:10870:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. { char myComponName[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:10871:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char parentComponName[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:10873:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(myComponName, "min_extents"); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:10877:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(myComponName, "max_extents"); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:11027:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *suffix, *datatype_str, tmp1[256], tmp2[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:11068:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp1, "value%d", i); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:11079:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp1, "mixed_value%d", i); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:11833:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *suffix, *datatype_str, tmp1[256], tmp2[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:11848:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp3[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:11863:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp1, "value%d", i); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:11975:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:12128:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[1024]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:12258:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb_private.h:98:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const *name[80]; /* Component name */ data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb_private.h:101:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char alloced[80]; /* Sentinel: 1 == space already alloc'd */ data/silo-llnl-4.10.2.real/src/score/scctl.c:89:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). extern FILE* fopen(const char*, const char*); data/silo-llnl-4.10.2.real/src/score/scctl.c:113:46: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). PFfopen lite_io_open_hook = (PFfopen) fopen; data/silo-llnl-4.10.2.real/src/score/scctl.c:210:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char t[MAXLINE]; data/silo-llnl-4.10.2.real/src/score/scctla.c:239:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char tokbuffer[MAXLINE]; /* used by firsttok and lasttok */ data/silo-llnl-4.10.2.real/src/score/scctla.c:354:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp, space, MIN(obp, nbp)); data/silo-llnl-4.10.2.real/src/score/scstr.c:90:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). else return (atoi(s)); data/silo-llnl-4.10.2.real/src/score/scstr.c:114:16: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). else return(atol(s)); data/silo-llnl-4.10.2.real/src/silo/silo.c:141:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. PUBLIC char db_errfunc[64]; /*name of erring function */ data/silo-llnl-4.10.2.real/src/silo/silo.c:189:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. PRIVATE unsigned char _db_fstatus[DB_NFILES]; /*file status */ data/silo-llnl-4.10.2.real/src/silo/silo.c:325:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char old_s[256] = {0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0, data/silo-llnl-4.10.2.real/src/silo/silo.c:441:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char s[32]; data/silo-llnl-4.10.2.real/src/silo/silo.c:444:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s, "Error %d", errorno); data/silo-llnl-4.10.2.real/src/silo/silo.c:680:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(str, "integer"); data/silo-llnl-4.10.2.real/src/silo/silo.c:683:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(str, "short"); data/silo-llnl-4.10.2.real/src/silo/silo.c:686:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(str, "long"); data/silo-llnl-4.10.2.real/src/silo/silo.c:689:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(str, "long_long"); data/silo-llnl-4.10.2.real/src/silo/silo.c:692:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(str, "float"); data/silo-llnl-4.10.2.real/src/silo/silo.c:695:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(str, "double"); data/silo-llnl-4.10.2.real/src/silo/silo.c:698:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(str, "char"); data/silo-llnl-4.10.2.real/src/silo/silo.c:1493:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char opts[256], cwd[256], orig_dir[256], *paths[64]; data/silo-llnl-4.10.2.real/src/silo/silo.c:1949:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[256], *b; data/silo-llnl-4.10.2.real/src/silo/silo.c:2297:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = open(name, O_RDONLY); data/silo-llnl-4.10.2.real/src/silo/silo.c:2353:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char tmpname[4096]; data/silo-llnl-4.10.2.real/src/silo/silo.c:2399:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(statbuf, &tmpstatbuf, sizeof(tmpstatbuf)); data/silo-llnl-4.10.2.real/src/silo/silo.c:2443:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char not_found[128]; data/silo-llnl-4.10.2.real/src/silo/silo.c:2517:27: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (_db_filter[i].open) { data/silo-llnl-4.10.2.real/src/silo/silo.c:2518:34: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). (void)(_db_filter[i].open) (dbfile, _db_filter[i].name); data/silo-llnl-4.10.2.real/src/silo/silo.c:2559:27: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int(*open)(DBfile*, char*)) data/silo-llnl-4.10.2.real/src/silo/silo.c:2577:27: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!init && !open) { data/silo-llnl-4.10.2.real/src/silo/silo.c:2583:38: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _db_filter[i].open = open; data/silo-llnl-4.10.2.real/src/silo/silo.c:2592:21: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (init || open) { data/silo-llnl-4.10.2.real/src/silo/silo.c:2597:34: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _db_filter[j].open = open; data/silo-llnl-4.10.2.real/src/silo/silo.c:2786:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(SILO_Globals.compressionParams, "METHOD=GZIP"); data/silo-llnl-4.10.2.real/src/silo/silo.c:2852:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[1024]; \ data/silo-llnl-4.10.2.real/src/silo/silo.c:2925:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwd[1024]; data/silo-llnl-4.10.2.real/src/silo/silo.c:3137:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[9] = {'\0','\0','\0','\0','\0','\0','\0','\0','\0'}; data/silo-llnl-4.10.2.real/src/silo/silo.c:3141:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(path, flags)) < 0) { data/silo-llnl-4.10.2.real/src/silo/silo.c:3486:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/silo-llnl-4.10.2.real/src/silo/silo.c:3499:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "'<i>%d'", ii); data/silo-llnl-4.10.2.real/src/silo/silo.c:3553:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/silo-llnl-4.10.2.real/src/silo/silo.c:3566:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "'<f>%g'", ff); data/silo-llnl-4.10.2.real/src/silo/silo.c:3605:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/silo-llnl-4.10.2.real/src/silo/silo.c:3618:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "'<d>%.30g'", ff); data/silo-llnl-4.10.2.real/src/silo/silo.c:3666:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/silo-llnl-4.10.2.real/src/silo/silo.c:3682:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "'<s>null'"); data/silo-llnl-4.10.2.real/src/silo/silo.c:3819:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char s[128]; data/silo-llnl-4.10.2.real/src/silo/silo.c:3822:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s, "Error %d", db_errno); data/silo-llnl-4.10.2.real/src/silo/silo.c:3960:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char version[256]; data/silo-llnl-4.10.2.real/src/silo/silo.c:4025:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char version[256]; data/silo-llnl-4.10.2.real/src/silo/silo.c:4029:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(version, "unknown; 4.5 or older"); data/silo-llnl-4.10.2.real/src/silo/silo.c:4182:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ascii[16]; data/silo-llnl-4.10.2.real/src/silo/silo.c:4197:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ascii, "%d", type); data/silo-llnl-4.10.2.real/src/silo/silo.c:4202:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ascii, "%d", mode); data/silo-llnl-4.10.2.real/src/silo/silo.c:4206:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ascii, "%d", type); data/silo-llnl-4.10.2.real/src/silo/silo.c:4379:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ascii[16]; data/silo-llnl-4.10.2.real/src/silo/silo.c:4395:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ascii, "%d", type); data/silo-llnl-4.10.2.real/src/silo/silo.c:4420:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ascii, "%d", type); data/silo-llnl-4.10.2.real/src/silo/silo.c:4611:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwd[4096]; data/silo-llnl-4.10.2.real/src/silo/silo.c:4782:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dname[32]; data/silo-llnl-4.10.2.real/src/silo/silo.c:4784:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dname, "driver-%d", i); data/silo-llnl-4.10.2.real/src/silo/silo.c:5246:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/silo-llnl-4.10.2.real/src/silo/silo.c:5254:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "'<d>%.30g'", val_for_mem); data/silo-llnl-4.10.2.real/src/silo/silo.c:5262:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "'<i>%d'", val_for_mem); data/silo-llnl-4.10.2.real/src/silo/silo.c:5269:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "'<i>%d'", val_for_mem); data/silo-llnl-4.10.2.real/src/silo/silo.c:5469:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/silo-llnl-4.10.2.real/src/silo/silo.c:6602:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(qm->labels[2], "Z Axis"); data/silo-llnl-4.10.2.real/src/silo/silo.c:6609:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(qm->labels[1], "Y Axis"); data/silo-llnl-4.10.2.real/src/silo/silo.c:6616:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(qm->labels[0], "X Axis"); data/silo-llnl-4.10.2.real/src/silo/silo.c:6821:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(um->labels[2], "Z Axis"); data/silo-llnl-4.10.2.real/src/silo/silo.c:6830:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(um->labels[1], "Y Axis"); data/silo-llnl-4.10.2.real/src/silo/silo.c:6839:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(um->labels[0], "X Axis"); data/silo-llnl-4.10.2.real/src/silo/silo.c:8721:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const *varnames[1]; data/silo-llnl-4.10.2.real/src/silo/silo.c:9040:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const *varnames[1]; data/silo-llnl-4.10.2.real/src/silo/silo.c:12301:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(retval[i],&strList[lstart],len); data/silo-llnl-4.10.2.real/src/silo/silo.c:12662:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[32767]; data/silo-llnl-4.10.2.real/src/silo/silo.c:13037:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[32767]; data/silo-llnl-4.10.2.real/src/silo/silo.c:13113:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char tmp[4096]; data/silo-llnl-4.10.2.real/src/silo/silo.c:13875:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(retval, s, n); data/silo-llnl-4.10.2.real/src/silo/silo_f.c:2082:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3], *nm = NULL; data/silo-llnl-4.10.2.real/src/silo/silo_f.c:3415:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(realenames, ca->elemnames[i], to_copy); data/silo-llnl-4.10.2.real/src/silo/silo_f.c:3429:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(values, ca->values, data/silo-llnl-4.10.2.real/src/silo/silo_f.c:3627:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (xvals, cu->x, total_size) ; data/silo-llnl-4.10.2.real/src/silo/silo_f.c:3628:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (yvals, cu->y, total_size) ; data/silo-llnl-4.10.2.real/src/silo/silo_f.c:3969:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpstr[64]; data/silo-llnl-4.10.2.real/src/silo/silo_f.c:4002:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(var, qv->vals[0], nbytes); data/silo-llnl-4.10.2.real/src/silo/silo_f.c:4019:13: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(tmpstr, "_mix"); data/silo-llnl-4.10.2.real/src/silo/silo_json.c:240:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char tmp[32]; data/silo-llnl-4.10.2.real/src/silo/silo_json.c:360:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[64]; data/silo-llnl-4.10.2.real/src/silo/silo_json.c:373:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp,"%-.16x",pblen); /* overwrite ptr value w/buffer-offset */ data/silo-llnl-4.10.2.real/src/silo/silo_json.c:374:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pb->buf + (pjhdr+12-jhdr),tmp,strlen(tmp)); /* overwrite ptr value w/buffer-offset */ data/silo-llnl-4.10.2.real/src/silo/silo_json.c:402:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strptr[128]; data/silo-llnl-4.10.2.real/src/silo/silo_json.c:413:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, buf+offset, nvals*db_GetMachDataSize(datatype)); data/silo-llnl-4.10.2.real/src/silo/silo_json.c:462:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(filename, O_RDONLY); data/silo-llnl-4.10.2.real/src/silo/silo_json.c:484:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(filename, O_CREAT|O_TRUNC|O_WRONLY, S_IRUSR|S_IWUSR); data/silo-llnl-4.10.2.real/src/silo/silo_json.c:496:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const *extptr_member_keys[1000]; data/silo-llnl-4.10.2.real/src/silo/silo_json.c:1057:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char subnm[32]; data/silo-llnl-4.10.2.real/src/silo/silo_json.c:1095:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. struct json_object *left, char const *lnm, data/silo-llnl-4.10.2.real/src/silo/silo_json.c:1096:32: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. struct json_object *right, char const *rnm, data/silo-llnl-4.10.2.real/src/silo/silo_json.c:1211:33: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const subnm[32]; data/silo-llnl-4.10.2.real/src/silo/silo_json.c:1221:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const subnm[32]; data/silo-llnl-4.10.2.real/src/silo/silo_json.c:1616:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cat_comp_name[1024]; data/silo-llnl-4.10.2.real/src/silo/silo_json.c:1635:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/silo-llnl-4.10.2.real/src/silo/silo_json.c:1693:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char objnm[256]; data/silo-llnl-4.10.2.real/src/silo/silo_json.c:1774:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[32]; data/silo-llnl-4.10.2.real/src/silo/silo_ns.c:62:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sval[128]; data/silo-llnl-4.10.2.real/src/silo/silo_ns.c:90:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(newnode->sval, "(null)"); data/silo-llnl-4.10.2.real/src/silo/silo_ns.c:145:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tokbuf[256]; data/silo-llnl-4.10.2.real/src/silo/silo_ns.c:161:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tokbuf[129]; data/silo-llnl-4.10.2.real/src/silo/silo_ns.c:176:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tokbuf[129]; data/silo-llnl-4.10.2.real/src/silo/silo_ns.c:264:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char * retstrbuf[DB_MAX_RETSTRS]; data/silo-llnl-4.10.2.real/src/silo/silo_ns.c:542:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char retval[1024]; data/silo-llnl-4.10.2.real/src/silo/silo_ns.c:553:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/silo-llnl-4.10.2.real/src/silo/silo_ns.c:554:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpfmt[256] = {0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0, data/silo-llnl-4.10.2.real/src/silo/silo_private.h:474:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *_labels[3]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:475:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *_units[3]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:476:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *_coordnames[3]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:477:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_time[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:478:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_dtime[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:479:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_cycle[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:535:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *_labels[3]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:536:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *_units[3]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:553:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_dims[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:554:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_zones[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:555:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_alignz[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:556:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_alignn[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:557:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_time[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:558:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_dtime[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:559:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_cycle[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:560:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_minindex[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:561:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_maxindex_n[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:562:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_maxindex_z[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:563:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_baseindex[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:611:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *_labels[3]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:612:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *_units[3]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:613:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _meshname[256]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:614:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_dims[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:615:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_zones[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:616:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_alignz[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:617:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_alignn[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:618:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_time[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:619:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_dtime[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:620:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_cycle[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:656:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *_labels[3]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:657:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *_units[3]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:658:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _meshname[256]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:659:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_time[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:660:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_dtime[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:661:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_cycle[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:715:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_time[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:716:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_dtime[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:717:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _nm_cycle[64]; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:767:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *_varname[2] ; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:768:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *_labels[2] ; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:769:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *_units[2] ; data/silo-llnl-4.10.2.real/src/silo/silo_private.h:820:22: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int (*open) (DBfile *, char *); data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:487:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(toc->dir_names[i], "state%02d", i); data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:490:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(toc->dir_names[i], "state%03d", i); data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:610:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (v, taurus->matnos, taurus->nmat * sizeof(int)); data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1147:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char meshname [256]; data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1444:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(mesh_name, "mesh1"); data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1458:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mesh_name, "/state%02d/mesh1", taurus->state); data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1460:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mesh_name, "/state%03d/mesh1", taurus->state); data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1609:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pwd[400]; data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1727:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, &taurus->state_time[taurus->state], 4); data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1731:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, &dtime, sizeof(double)); data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1734:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, &taurus->state, 4); data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1737:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, &taurus->nmat, 4); data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1740:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, &(taurus->title), strlen(taurus->title) + 1); data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1743:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, "filled-boundary mat1;mesh mesh1", 32); data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1778:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char opath[160]; data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1779:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char npath[160]; data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1876:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(path, "/state%02d", taurus->state); data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1879:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(path, "/state%03d", taurus->state); data/silo-llnl-4.10.2.real/src/taurus/taurus.c:480:31: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((taurus->fd = open(taurus->filename, O_RDONLY)) < 0) { data/silo-llnl-4.10.2.real/src/taurus/taurus.c:1600:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char title[48]; data/silo-llnl-4.10.2.real/src/taurus/taurus.c:1611:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(basename, O_RDONLY)) < 0) { data/silo-llnl-4.10.2.real/src/taurus/taurus.h:189:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char title[48]; /* The title associated with the file */ data/silo-llnl-4.10.2.real/src/unknown/silo_unknown.c:135:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tried[1024], ascii[32]; data/silo-llnl-4.10.2.real/src/unknown/silo_unknown.c:144:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(tried, "attempted SILO drivers:"); data/silo-llnl-4.10.2.real/src/unknown/silo_unknown.c:220:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ascii, " DB_HDF5_OPTS(%d)", opts_set_ids[i]); data/silo-llnl-4.10.2.real/src/unknown/silo_unknown.c:294:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ascii, " DB_HDF5_OPTS(%d)", opts_set_ids[i]); data/silo-llnl-4.10.2.real/tests/TestReadMask.c:754:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)&start_time, (void *)&end_time, sizeof(struct timeval)); data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:147:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Buff[BUFFSIZE]; data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:392:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *acf = fopen(xmlFileName, "r"); data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:451:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpName[256]; data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:452:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lvlMapsName[256]; data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:453:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chldMapsName[256]; data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:483:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char syscmd[256]; data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:569:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *levelRegnNames[1]; data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:590:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *patchRegnNames[1]; data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:609:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *mrgv_onames[5]; data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:631:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *compnames[3] = {"iRatio","jRatio","kRatio"}; data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:632:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *levelRegnNames[1]; data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:654:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *compnames[6] = {"iMin","iMax","jMin","jMax","kMin","kMax"}; data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:655:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *scompnames[6] = {"xMin","xMax","yMin","yMax","zMin","zMax"}; data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:656:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *patchRegnNames[1]; data/silo-llnl-4.10.2.real/tests/alltypes.c:79:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mesh_command[256]; data/silo-llnl-4.10.2.real/tests/alltypes.c:274:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mesh_command, "mesh mesh"); data/silo-llnl-4.10.2.real/tests/arbpoly.c:65:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3]; data/silo-llnl-4.10.2.real/tests/arbpoly2d.c:65:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3]; data/silo-llnl-4.10.2.real/tests/array.c:87:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ename[3]; data/silo-llnl-4.10.2.real/tests/compression.c:106:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpname[64]; data/silo-llnl-4.10.2.real/tests/compression.c:203:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmpname, "compression_%04d", j); data/silo-llnl-4.10.2.real/tests/compression.c:223:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmpname, "compression_%04d", j); data/silo-llnl-4.10.2.real/tests/compression.c:281:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmpname, "compression_%04d", j); data/silo-llnl-4.10.2.real/tests/compression.c:312:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmpname, "compression_%04d", j); data/silo-llnl-4.10.2.real/tests/cpz1plt.c:76:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpstr [256]; data/silo-llnl-4.10.2.real/tests/cpz1plt.c:236:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (tmpstr, "state%.2d", j); data/silo-llnl-4.10.2.real/tests/csg.c:167:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *pname[1]; data/silo-llnl-4.10.2.real/tests/csg.c:181:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char meshName[256]; data/silo-llnl-4.10.2.real/tests/dir.c:92:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *meshnames[3], original_dir[128]; data/silo-llnl-4.10.2.real/tests/efcentering.c:234:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3]; data/silo-llnl-4.10.2.real/tests/empty.c:66:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nm[256]; \ data/silo-llnl-4.10.2.real/tests/empty.c:109:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const * const cnames[3] = {"x","y","z"}; data/silo-llnl-4.10.2.real/tests/extface.c:1817:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3] = {"xcoords", "ycoords", "zcoords"}; data/silo-llnl-4.10.2.real/tests/grab.c:129:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mesh_command[256]; data/silo-llnl-4.10.2.real/tests/grab.c:131:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3]={"x", "y", "z"}; data/silo-llnl-4.10.2.real/tests/grab.c:241:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mesh_command, "mesh mesh; contour foo"); data/silo-llnl-4.10.2.real/tests/grab.c:290:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mesh_command, "mesh mesh; contour bar"); data/silo-llnl-4.10.2.real/tests/group_test.c:293:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[256]; data/silo-llnl-4.10.2.real/tests/group_test.c:423:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/group_test.c:424:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *meshnames[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/group_test.c:426:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names1[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/group_test.c:427:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names2[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/group_test.c:428:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names3[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/group_test.c:429:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names4[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/group_test.c:430:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names5[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/group_test.c:431:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *var1names[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/group_test.c:432:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *var2names[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/group_test.c:433:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *var3names[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/group_test.c:434:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *var4names[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/group_test.c:435:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *var5names[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/group_test.c:437:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names0[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/group_test.c:438:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *matnames[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/group_test.c:439:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirnames[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/group_test.c:454:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(names[i], "/block%d/mesh1", i); data/silo-llnl-4.10.2.real/tests/group_test.c:458:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(names1[i], "/block%d/d", i); data/silo-llnl-4.10.2.real/tests/group_test.c:459:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(names2[i], "/block%d/p", i); data/silo-llnl-4.10.2.real/tests/group_test.c:460:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(names3[i], "/block%d/u", i); data/silo-llnl-4.10.2.real/tests/group_test.c:461:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(names4[i], "/block%d/v", i); data/silo-llnl-4.10.2.real/tests/group_test.c:462:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(names5[i], "/block%d/w", i); data/silo-llnl-4.10.2.real/tests/group_test.c:470:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(names0[i], "/block%d/mat1", i); data/silo-llnl-4.10.2.real/tests/group_test.c:475:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dirnames[i], "/block%d", i); data/silo-llnl-4.10.2.real/tests/group_test.c:629:36: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. build_block_rect3d(DBfile *dbfile, char dirnames[MAXBLOCKS][STRLEN], data/silo-llnl-4.10.2.real/tests/group_test.c:635:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const * const coordnames[3] = {"xcoords", "ycoords", "zcoords"}; data/silo-llnl-4.10.2.real/tests/group_test.c:1014:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. build_block_ucd3d(DBfile *dbfile, char dirnames[MAXBLOCKS][STRLEN], data/silo-llnl-4.10.2.real/tests/group_test.c:1027:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const * const coordnames[3] = {"xcoords", "ycoords", "zcoords"}; data/silo-llnl-4.10.2.real/tests/group_test.c:1040:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *varnames[1]; data/silo-llnl-4.10.2.real/tests/group_test.c:1566:36: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. build_block_curv3d(DBfile *dbfile, char dirnames[MAXBLOCKS][STRLEN], data/silo-llnl-4.10.2.real/tests/group_test.c:1579:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const * const coordnames[3] = {"xcoords", "ycoords", "zcoords"}; data/silo-llnl-4.10.2.real/tests/ioperf.c:159:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rstate[128]; data/silo-llnl-4.10.2.real/tests/ioperf.c:160:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char retval[128]; data/silo-llnl-4.10.2.real/tests/ioperf.c:164:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(retval, "%08d", opts->mpi_rank); data/silo-llnl-4.10.2.real/tests/ioperf.c:179:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(retval, "%08d", hval); data/silo-llnl-4.10.2.real/tests/ioperf.c:212:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char plugin_opts_delim[256]; data/silo-llnl-4.10.2.real/tests/ioperf.c:319:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char testfilename[256]; data/silo-llnl-4.10.2.real/tests/ioperf.c:320:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifacename[256]; data/silo-llnl-4.10.2.real/tests/ioperf.c:351:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char libfilename[256]; data/silo-llnl-4.10.2.real/tests/ioperf_hdf5.c:120:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dsname[256]; data/silo-llnl-4.10.2.real/tests/ioperf_hdf5.c:128:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dsname, "data_%07d", n++); data/silo-llnl-4.10.2.real/tests/ioperf_hdf5.c:141:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dsname[256]; data/silo-llnl-4.10.2.real/tests/ioperf_hdf5.c:149:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dsname, "data_%07d", n++); data/silo-llnl-4.10.2.real/tests/ioperf_pdb.c:75:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dsname[256]; data/silo-llnl-4.10.2.real/tests/ioperf_pdb.c:77:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dsname, "data_%07d(%d)", n++, (int) (nbytes/sizeof(double))); data/silo-llnl-4.10.2.real/tests/ioperf_sec2.c:79:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(filename, flags, S_IRUSR|S_IWUSR); data/silo-llnl-4.10.2.real/tests/ioperf_silo.c:96:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dsname[64]; data/silo-llnl-4.10.2.real/tests/ioperf_silo.c:97:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dsname, "data_%07d", n++); data/silo-llnl-4.10.2.real/tests/ioperf_silo.c:107:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dsname[64]; data/silo-llnl-4.10.2.real/tests/ioperf_silo.c:110:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dsname, "data_%07d", n++); data/silo-llnl-4.10.2.real/tests/ioperf_silo.c:145:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char compstr[256]; data/silo-llnl-4.10.2.real/tests/ioperf_stdio.c:74:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). file = fopen(filename, mode); data/silo-llnl-4.10.2.real/tests/json.c:167:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open("onehex-A.bson", O_CREAT|O_TRUNC|O_WRONLY, S_IRUSR|S_IWUSR); data/silo-llnl-4.10.2.real/tests/json.c:177:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open("onehex-B.bson", O_CREAT|O_TRUNC|O_WRONLY, S_IRUSR|S_IWUSR); data/silo-llnl-4.10.2.real/tests/largefile.c:176:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpname[64]; data/silo-llnl-4.10.2.real/tests/largefile.c:181:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmpname, "simple_%04d", j); data/silo-llnl-4.10.2.real/tests/largefile.c:219:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpname[64]; data/silo-llnl-4.10.2.real/tests/largefile.c:223:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmpname, "simple_%04d", n); data/silo-llnl-4.10.2.real/tests/listtypes.c:154:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char indent[1024]; data/silo-llnl-4.10.2.real/tests/listtypes.c:168:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char currentdir[1024]; data/silo-llnl-4.10.2.real/tests/mat3d_3across.c:133:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const * const coordnames[3] = {"x", "y", "z"}; data/silo-llnl-4.10.2.real/tests/merge_block.c:162:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpstr[256]; data/silo-llnl-4.10.2.real/tests/merge_block.c:233:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (tmpstr, "/domain_%d/mesh_3d", i); data/silo-llnl-4.10.2.real/tests/merge_block.c:239:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (tmpstr, "/domain_%d/global_node_map", i); data/silo-llnl-4.10.2.real/tests/merge_block.c:246:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (tmpstr, "/domain_%d/material", i); data/silo-llnl-4.10.2.real/tests/multi_file.c:333:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/multi_file.c:334:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *meshnames[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/multi_file.c:336:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names1[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/multi_file.c:337:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names2[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/multi_file.c:338:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names3[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/multi_file.c:339:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names4[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/multi_file.c:340:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names5[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/multi_file.c:341:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *var1names[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/multi_file.c:342:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *var2names[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/multi_file.c:343:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *var3names[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/multi_file.c:344:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *var4names[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/multi_file.c:345:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *var5names[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/multi_file.c:347:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names0[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/multi_file.c:348:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *matnames[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/multi_file.c:349:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file_ns[128]; data/silo-llnl-4.10.2.real/tests/multi_file.c:350:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char block_ns[128]; data/silo-llnl-4.10.2.real/tests/multi_file.c:355:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[80]; data/silo-llnl-4.10.2.real/tests/multi_file.c:367:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prefix[120]; data/silo-llnl-4.10.2.real/tests/multi_file.c:415:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(block_ns, "|/block%%d/mesh1|n"); data/silo-llnl-4.10.2.real/tests/multi_file.c:474:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(block_ns, "|/block%%d/d|n"); data/silo-llnl-4.10.2.real/tests/multi_file.c:482:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(block_ns, "|/block%%d/p|n"); data/silo-llnl-4.10.2.real/tests/multi_file.c:490:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(block_ns, "|/block%%d/u|n"); data/silo-llnl-4.10.2.real/tests/multi_file.c:498:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(block_ns, "|/block%%d/v|n"); data/silo-llnl-4.10.2.real/tests/multi_file.c:506:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(block_ns, "|/block%%d/w|n"); data/silo-llnl-4.10.2.real/tests/multi_file.c:514:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(block_ns, "|/block%%d/mat1|n"); data/silo-llnl-4.10.2.real/tests/multi_file.c:547:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const * const coordnames[3] = {"xcoords", "ycoords", "zcoords"}; data/silo-llnl-4.10.2.real/tests/multi_file.c:556:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *varnames[1]; data/silo-llnl-4.10.2.real/tests/multi_file.c:766:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirname[80]; data/silo-llnl-4.10.2.real/tests/multi_file.c:768:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[120]; data/silo-llnl-4.10.2.real/tests/multi_file.c:800:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dirname, "/block%d", block); data/silo-llnl-4.10.2.real/tests/multi_file.c:987:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dname[60]; data/silo-llnl-4.10.2.real/tests/multi_file.c:988:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dname, "multi_file.dir/%03d", filenum); data/silo-llnl-4.10.2.real/tests/multi_test.c:107:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char saved_byte_bucket1[4096], saved_byte_bucket2[4096]; data/silo-llnl-4.10.2.real/tests/multi_test.c:128:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&saved_byte_bucket1[nsaved], struct1+offset, size); data/silo-llnl-4.10.2.real/tests/multi_test.c:129:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&saved_byte_bucket2[nsaved], struct2+offset, size); data/silo-llnl-4.10.2.real/tests/multi_test.c:135:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(struct1+offset, &saved_byte_bucket1[nsaved], size); data/silo-llnl-4.10.2.real/tests/multi_test.c:136:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(struct2+offset, &saved_byte_bucket2[nsaved], size); data/silo-llnl-4.10.2.real/tests/multi_test.c:776:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[256], *file_ext=".pdb"; data/silo-llnl-4.10.2.real/tests/multi_test.c:1079:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/multi_test.c:1080:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const *meshnames[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/multi_test.c:1082:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names1[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/multi_test.c:1083:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names2[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/multi_test.c:1084:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names3[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/multi_test.c:1085:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names4[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/multi_test.c:1086:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names5[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/multi_test.c:1087:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *var1names[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/multi_test.c:1088:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *var2names[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/multi_test.c:1089:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *var3names[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/multi_test.c:1090:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *var4names[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/multi_test.c:1091:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *var5names[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/multi_test.c:1093:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names0[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/multi_test.c:1094:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *matnames[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/multi_test.c:1095:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirnames[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/multi_test.c:1114:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(names[i], "/block%d/mesh1", i); data/silo-llnl-4.10.2.real/tests/multi_test.c:1118:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(names1[i], "/block%d/d", i); data/silo-llnl-4.10.2.real/tests/multi_test.c:1119:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(names2[i], "/block%d/p", i); data/silo-llnl-4.10.2.real/tests/multi_test.c:1120:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(names3[i], "/block%d/u", i); data/silo-llnl-4.10.2.real/tests/multi_test.c:1121:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(names4[i], "/block%d/v", i); data/silo-llnl-4.10.2.real/tests/multi_test.c:1122:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(names5[i], "/block%d/w", i); data/silo-llnl-4.10.2.real/tests/multi_test.c:1130:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(names0[i], "/block%d/mat1", i); data/silo-llnl-4.10.2.real/tests/multi_test.c:1135:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dirnames[i], "/block%d", i); data/silo-llnl-4.10.2.real/tests/multi_test.c:1291:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *colors[3] = {"yellow","cyan","black"}; data/silo-llnl-4.10.2.real/tests/multi_test.c:1292:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *matrnames[3] = {"outer","middle","inner"}; data/silo-llnl-4.10.2.real/tests/multi_test.c:1309:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vnames[3][STRLEN], *pvnames[3]; data/silo-llnl-4.10.2.real/tests/multi_test.c:1310:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char defns[3][STRLEN], *pdefns[3]; data/silo-llnl-4.10.2.real/tests/multi_test.c:1314:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(vnames[0], "sum"); data/silo-llnl-4.10.2.real/tests/multi_test.c:1317:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(defns[0], "u+v"); data/silo-llnl-4.10.2.real/tests/multi_test.c:1319:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(defns[0], "u+v+w"); data/silo-llnl-4.10.2.real/tests/multi_test.c:1323:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(vnames[1], "vec"); data/silo-llnl-4.10.2.real/tests/multi_test.c:1326:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(defns[1], "{u,v}"); data/silo-llnl-4.10.2.real/tests/multi_test.c:1328:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(defns[1], "{u,v,w}"); data/silo-llnl-4.10.2.real/tests/multi_test.c:1332:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(vnames[2], "nmats"); data/silo-llnl-4.10.2.real/tests/multi_test.c:1334:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(defns[2], "nmats(mat1)"); data/silo-llnl-4.10.2.real/tests/multi_test.c:1363:36: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. build_block_rect2d(DBfile *dbfile, char dirnames[MAXBLOCKS][STRLEN], data/silo-llnl-4.10.2.real/tests/multi_test.c:1369:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3]; data/silo-llnl-4.10.2.real/tests/multi_test.c:1801:36: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. build_block_curv2d(DBfile *dbfile, char dirnames[MAXBLOCKS][STRLEN], data/silo-llnl-4.10.2.real/tests/multi_test.c:1807:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3]; data/silo-llnl-4.10.2.real/tests/multi_test.c:2100:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. build_block_point2d(DBfile *dbfile, char dirnames[MAXBLOCKS][STRLEN], data/silo-llnl-4.10.2.real/tests/multi_test.c:2345:36: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. build_block_rect3d(DBfile *dbfile, char dirnames[MAXBLOCKS][STRLEN], data/silo-llnl-4.10.2.real/tests/multi_test.c:2351:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3]; data/silo-llnl-4.10.2.real/tests/multi_test.c:2736:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. build_block_ucd3d(DBfile *dbfile, char dirnames[MAXBLOCKS][STRLEN], data/silo-llnl-4.10.2.real/tests/multi_test.c:2743:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3]; data/silo-llnl-4.10.2.real/tests/multi_test.c:2756:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *varnames[1]; data/silo-llnl-4.10.2.real/tests/multi_test.c:3263:36: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. build_block_curv3d(DBfile *dbfile, char dirnames[MAXBLOCKS][STRLEN], data/silo-llnl-4.10.2.real/tests/multi_test.c:3269:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3]; data/silo-llnl-4.10.2.real/tests/multispec.c:110:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *meshnames[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/multispec.c:112:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names[7][MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/multispec.c:113:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *varnames[4][MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/multispec.c:115:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *matnames[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/multispec.c:116:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *specnames[MAXBLOCKS]; data/silo-llnl-4.10.2.real/tests/multispec.c:117:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirnames[MAXBLOCKS][STRLEN]; data/silo-llnl-4.10.2.real/tests/multispec.c:118:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *meshname, data/silo-llnl-4.10.2.real/tests/multispec.c:125:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const * const coordnames[3] = {"xcoords", "ycoords", "zcoords"}; data/silo-llnl-4.10.2.real/tests/multispec.c:181:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(names[6][i], "/block%d/mesh1", i); data/silo-llnl-4.10.2.real/tests/multispec.c:185:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(names[0][i], "/block%d/d", i); data/silo-llnl-4.10.2.real/tests/multispec.c:186:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(names[1][i], "/block%d/p", i); data/silo-llnl-4.10.2.real/tests/multispec.c:187:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(names[2][i], "/block%d/u", i); data/silo-llnl-4.10.2.real/tests/multispec.c:188:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(names[3][i], "/block%d/v", i); data/silo-llnl-4.10.2.real/tests/multispec.c:195:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(names[4][i], "/block%d/mat1", i); data/silo-llnl-4.10.2.real/tests/multispec.c:197:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(names[5][i], "/block%d/species1",i); data/silo-llnl-4.10.2.real/tests/multispec.c:202:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(dirnames[i], "/block%d", i); data/silo-llnl-4.10.2.real/tests/namescheme.c:88:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const * const N[3] = {"red","green","blue"}; data/silo-llnl-4.10.2.real/tests/namescheme.c:89:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char blockName[1024]; data/silo-llnl-4.10.2.real/tests/namescheme.c:93:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teststr[256]; data/silo-llnl-4.10.2.real/tests/onehex.c:117:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const * const coordnames[3] = {"xcoords", "ycoords", "zcoords"}; data/silo-llnl-4.10.2.real/tests/onehex.c:126:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mesh_command[256]; data/silo-llnl-4.10.2.real/tests/onehex.c:332:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mesh_command, "mesh hex; contour v"); data/silo-llnl-4.10.2.real/tests/oneprism.c:107:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3]; data/silo-llnl-4.10.2.real/tests/oneprism.c:116:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mesh_command[256]; data/silo-llnl-4.10.2.real/tests/oneprism.c:229:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mesh_command, "mesh prism; contour v"); data/silo-llnl-4.10.2.real/tests/onepyramid.c:100:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3]; data/silo-llnl-4.10.2.real/tests/onepyramid.c:109:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mesh_command[256]; data/silo-llnl-4.10.2.real/tests/onepyramid.c:217:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mesh_command, "mesh pyramid; contour v"); data/silo-llnl-4.10.2.real/tests/onetet.c:101:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3]; data/silo-llnl-4.10.2.real/tests/onetet.c:110:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mesh_command[256]; data/silo-llnl-4.10.2.real/tests/onetet.c:215:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mesh_command, "mesh tet; contour v"); data/silo-llnl-4.10.2.real/tests/partial_io.c:158:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vname[8], mesg[64] ; data/silo-llnl-4.10.2.real/tests/partial_io.c:229:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (vname, "row%d", i+1) ; data/silo-llnl-4.10.2.real/tests/partial_io.c:363:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (mesg, "when reading row %d", i+1) ; data/silo-llnl-4.10.2.real/tests/pdbtst.c:178:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char retval[32]; data/silo-llnl-4.10.2.real/tests/pdbtst.c:180:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(retval, "foo%d", i++); data/silo-llnl-4.10.2.real/tests/pdbtst.c:345:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c[2]; data/silo-llnl-4.10.2.real/tests/pdbtst.c:347:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char e[3]; data/silo-llnl-4.10.2.real/tests/pdbtst.c:349:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char g[4]; data/silo-llnl-4.10.2.real/tests/pdbtst.c:351:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char i[5]; data/silo-llnl-4.10.2.real/tests/pdbtst.c:353:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char k[6];}; data/silo-llnl-4.10.2.real/tests/pdbtst.c:410:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char data/silo-llnl-4.10.2.real/tests/pdbtst.c:508:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char data/silo-llnl-4.10.2.real/tests/pdbtst.c:575:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. {char t[MAXLINE]; data/silo-llnl-4.10.2.real/tests/pdbtst.c:721:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char datfile[MAXLINE], fname[MAXLINE]; data/silo-llnl-4.10.2.real/tests/pdbtst.c:826:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ca_w, "Hi there!"); data/silo-llnl-4.10.2.real/tests/pdbtst.c:1244:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char datfile[MAXLINE], fname[MAXLINE]; data/silo-llnl-4.10.2.real/tests/pdbtst.c:1983:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char datfile[MAXLINE], fname[MAXLINE]; data/silo-llnl-4.10.2.real/tests/pdbtst.c:2264:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char datfile[MAXLINE], fname[MAXLINE]; data/silo-llnl-4.10.2.real/tests/pdbtst.c:2627:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char datfile[MAXLINE], fname[MAXLINE]; data/silo-llnl-4.10.2.real/tests/pdbtst.c:2896:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char datfile[MAXLINE], fname[MAXLINE]; data/silo-llnl-4.10.2.real/tests/pdbtst.c:3109:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char datfile[MAXLINE], fname[MAXLINE]; data/silo-llnl-4.10.2.real/tests/pdbtst.c:3317:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char datfile[MAXLINE], fname[MAXLINE]; data/silo-llnl-4.10.2.real/tests/pdbtst.c:3580:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char datfile[MAXLINE], fname[MAXLINE]; data/silo-llnl-4.10.2.real/tests/pdbtst.c:3646:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char datfile[MAXLINE], fname[MAXLINE]; data/silo-llnl-4.10.2.real/tests/pdbtst.c:3868:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char datfile[MAXLINE], fname[MAXLINE]; data/silo-llnl-4.10.2.real/tests/pdbtst.c:3952:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[MAXLINE]; data/silo-llnl-4.10.2.real/tests/pmpio_hdf5_test.c:156:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[256], nsName[256]; data/silo-llnl-4.10.2.real/tests/pmpio_hdf5_test.c:162:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). numGroups = atoi(argv[1]); data/silo-llnl-4.10.2.real/tests/pmpio_hdf5_test.c:171:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fileName, "pmpio_hdf5_data_%03d.h5", bat->groupRank); data/silo-llnl-4.10.2.real/tests/pmpio_hdf5_test.c:172:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nsName, "domain_%03d", bat->rankInComm); data/silo-llnl-4.10.2.real/tests/pmpio_silo_test_mesh.c:147:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[256], nsName[256]; data/silo-llnl-4.10.2.real/tests/pmpio_silo_test_mesh.c:149:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[2], *varnames[2]; data/silo-llnl-4.10.2.real/tests/pmpio_silo_test_mesh.c:196:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nsName, "domain_%03d", rank); data/silo-llnl-4.10.2.real/tests/pmpio_silo_test_mesh.c:311:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(meshBlockNames[i], "/domain_%03d/qmesh", i); data/silo-llnl-4.10.2.real/tests/pmpio_silo_test_mesh.c:312:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(velBlockNames[i], "/domain_%03d/velocity", i); data/silo-llnl-4.10.2.real/tests/pmpio_silo_test_mesh.c:313:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tempBlockNames[i], "/domain_%03d/temp", i); data/silo-llnl-4.10.2.real/tests/point.c:149:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[256], *file_ext=".pdb"; data/silo-llnl-4.10.2.real/tests/point.c:241:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name2[256]; data/silo-llnl-4.10.2.real/tests/polyzl.c:110:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3]; data/silo-llnl-4.10.2.real/tests/readstuff.c:75:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[256]; data/silo-llnl-4.10.2.real/tests/readstuff.c:76:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *obj_names[13]; data/silo-llnl-4.10.2.real/tests/rocket_silo.cxx:283:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3]; data/silo-llnl-4.10.2.real/tests/rocket_silo.cxx:329:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3]; data/silo-llnl-4.10.2.real/tests/rocket_silo.cxx:402:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *mnames[ndoms]; data/silo-llnl-4.10.2.real/tests/sami.c:85:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cdata_g[TEST_NELMTS]; data/silo-llnl-4.10.2.real/tests/sami.c:225:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cdata_in[TEST_NELMTS]; data/silo-llnl-4.10.2.real/tests/sami.c:711:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cdata_out[TEST_NELMTS]; data/silo-llnl-4.10.2.real/tests/sami.c:842:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curdir[1024]; data/silo-llnl-4.10.2.real/tests/spec.c:90:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[2]; /* Name the axes */ data/silo-llnl-4.10.2.real/tests/specmix.c:209:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[64], *file_ext=".pdb"; data/silo-llnl-4.10.2.real/tests/specmix.c:519:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[2]; data/silo-llnl-4.10.2.real/tests/specmix.c:520:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *varnames[6]; data/silo-llnl-4.10.2.real/tests/specmix.c:578:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(coordnames[0],"xn"); data/silo-llnl-4.10.2.real/tests/specmix.c:579:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(coordnames[1],"yn"); data/silo-llnl-4.10.2.real/tests/specmix.c:585:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(coordnames[0],"xz"); data/silo-llnl-4.10.2.real/tests/specmix.c:586:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(coordnames[1],"yz"); data/silo-llnl-4.10.2.real/tests/specmix.c:591:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(coordnames[0],"xnz"); data/silo-llnl-4.10.2.real/tests/specmix.c:592:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(coordnames[1],"ynz"); data/silo-llnl-4.10.2.real/tests/subhex.c:123:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3]; data/silo-llnl-4.10.2.real/tests/subhex.c:135:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mesh_command[256]; data/silo-llnl-4.10.2.real/tests/subhex.c:272:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mesh_command, "mesh hex; contour v"); data/silo-llnl-4.10.2.real/tests/testall.c:1083:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/silo-llnl-4.10.2.real/tests/testall.c:1286:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buf, "mesh ucdmesh2d;pseudocolor d"); data/silo-llnl-4.10.2.real/tests/testall.c:1290:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buf,"vel vector {u,v};speed scalar sqrt(u*u+v*v)"); data/silo-llnl-4.10.2.real/tests/testall.c:1640:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). binf = open("rect3dz.bin", O_CREAT|O_TRUNC|O_WRONLY, S_IRUSR|S_IWUSR); data/silo-llnl-4.10.2.real/tests/testall.c:1642:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). binf = open("rect3dz.bin", O_CREAT|O_TRUNC|O_WRONLY, S_IREAD|S_IWRITE); data/silo-llnl-4.10.2.real/tests/testall.c:1657:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). binf = open("rect3dn.bin", O_CREAT|O_TRUNC|O_WRONLY, S_IRUSR|S_IWUSR); data/silo-llnl-4.10.2.real/tests/testall.c:1659:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). binf = open("rect3dn.bin", O_CREAT|O_TRUNC|O_WRONLY, S_IREAD|S_IWRITE); data/silo-llnl-4.10.2.real/tests/testall.c:2210:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *varnames[1]; data/silo-llnl-4.10.2.real/tests/testall.c:2212:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ascii[2646]; data/silo-llnl-4.10.2.real/tests/testall.c:2646:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3]; data/silo-llnl-4.10.2.real/tests/testall.c:2668:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *varnames[1]; data/silo-llnl-4.10.2.real/tests/testall.c:3175:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char const *ename[3]; data/silo-llnl-4.10.2.real/tests/testall.c:3307:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[256]; data/silo-llnl-4.10.2.real/tests/testlib.c:109:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3], *varnames[3]; data/silo-llnl-4.10.2.real/tests/testlib.c:223:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3], *varnames[3]; data/silo-llnl-4.10.2.real/tests/testlib.c:427:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3], *varnames[2]; data/silo-llnl-4.10.2.real/tests/testlib.c:604:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3], *varnames[3]; data/silo-llnl-4.10.2.real/tests/testlib.c:822:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3], *varnames[1]; data/silo-llnl-4.10.2.real/tests/testpdb.c:131:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[256]; data/silo-llnl-4.10.2.real/tests/testpdb.c:134:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char carray[256]; data/silo-llnl-4.10.2.real/tests/twohex.c:116:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3]; data/silo-llnl-4.10.2.real/tests/twohex.c:124:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mesh_command[256]; data/silo-llnl-4.10.2.real/tests/twohex.c:249:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(mesh_command, "mesh hex; contour v"); data/silo-llnl-4.10.2.real/tests/twohex.c:259:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpname[256]; data/silo-llnl-4.10.2.real/tests/ucd.c:205:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3], *varnames[8], *alt_nodenum_varnames[5]; data/silo-llnl-4.10.2.real/tests/ucd.c:248:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vname[16]; data/silo-llnl-4.10.2.real/tests/ucd.c:250:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(vname, "d%d", i); data/silo-llnl-4.10.2.real/tests/ucdsamp3.c:153:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *varnames[3]; data/silo-llnl-4.10.2.real/tests/ucdsamp3.c:157:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3]; data/silo-llnl-4.10.2.real/tests/wave.c:126:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *coordnames[3]={"x", "y", "z"}; data/silo-llnl-4.10.2.real/tests/wave.c:132:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[80]; data/silo-llnl-4.10.2.real/tests/wave.c:179:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(filename, "wave%.4d.silo", cycle); data/silo-llnl-4.10.2.real/tools/browser/array.c:488:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/silo-llnl-4.10.2.real/tools/browser/array.c:673:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/silo-llnl-4.10.2.real/tools/browser/array.c:1143:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/silo-llnl-4.10.2.real/tools/browser/array.c:1197:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "ary_deref: arg-%d is an inappropriate array " data/silo-llnl-4.10.2.real/tools/browser/array.c:1305:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *s, *t, *rest, buf[1024]; data/silo-llnl-4.10.2.real/tools/browser/array.c:1548:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char title[64]; data/silo-llnl-4.10.2.real/tools/browser/array.c:1552:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (title, "*** Footnote %d", num++); data/silo-llnl-4.10.2.real/tools/browser/array.c:1565:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (title, "*** Footnote %d", num++); data/silo-llnl-4.10.2.real/tools/browser/array.c:1577:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (title, "*** Footnote %d", num++); data/silo-llnl-4.10.2.real/tools/browser/array.c:1589:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (title, "*** Footnote %d", num++); data/silo-llnl-4.10.2.real/tools/browser/array.c:1601:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (title, "*** Footnote %d", num++); data/silo-llnl-4.10.2.real/tools/browser/browser.c:135:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char HistoryFile[1024]; /*command history file name */ data/silo-llnl-4.10.2.real/tools/browser/browser.c:140:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ObjTypeName[BROWSER_NOBJTYPES] = { data/silo-llnl-4.10.2.real/tools/browser/browser.c:469:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *s, *slash, cwd[1024]; data/silo-llnl-4.10.2.real/tools/browser/browser.c:655:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[64]; data/silo-llnl-4.10.2.real/tools/browser/browser.c:876:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[32]; data/silo-llnl-4.10.2.real/tools/browser/browser.c:879:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "%d", OUT_NROWS); data/silo-llnl-4.10.2.real/tools/browser/browser.c:881:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "%d", OUT_NCOLS); data/silo-llnl-4.10.2.real/tools/browser/browser.c:967:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/silo-llnl-4.10.2.real/tools/browser/browser.c:977:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%d", Verbosity); data/silo-llnl-4.10.2.real/tools/browser/browser.c:1066:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[32], *s, *t, *word; data/silo-llnl-4.10.2.real/tools/browser/browser.c:1116:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "%d", sw->value.d); /*boolean*/ data/silo-llnl-4.10.2.real/tools/browser/browser.c:1290:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char init_file_buf[1024]; data/silo-llnl-4.10.2.real/tools/browser/browser.c:1346:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userhome[1024]; data/silo-llnl-4.10.2.real/tools/browser/browser.c:1348:9: [2] (buffer) TCHAR: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. TCHAR szPath[MAX_PATH]; data/silo-llnl-4.10.2.real/tools/browser/browser.c:1391:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userhome[1024]; data/silo-llnl-4.10.2.real/tools/browser/browser.c:1393:9: [2] (buffer) TCHAR: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. TCHAR szPath[MAX_PATH]; data/silo-llnl-4.10.2.real/tools/browser/browser.c:1617:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sym[16]; data/silo-llnl-4.10.2.real/tools/browser/browser.c:1620:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sym, "$%d", i); data/silo-llnl-4.10.2.real/tools/browser/browser.h:301:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lexeme[8192]; /*current lexeme */ data/silo-llnl-4.10.2.real/tools/browser/browser.h:351:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *value[500]; data/silo-llnl-4.10.2.real/tools/browser/browser.h:486:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char *ObjTypeName[BROWSER_NOBJTYPES]; data/silo-llnl-4.10.2.real/tools/browser/file.c:526:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwd[1024]; data/silo-llnl-4.10.2.real/tools/browser/file.c:528:35: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if (DBGetDir (self->f, cwd)<0) strcpy (cwd, "???"); data/silo-llnl-4.10.2.real/tools/browser/file.c:599:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char **new_names, suffix[32]; data/silo-llnl-4.10.2.real/tools/browser/file.c:612:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(suffix, " [%dst occurrence]", occur); data/silo-llnl-4.10.2.real/tools/browser/file.c:614:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(suffix, " [%dnd occurrence]", occur); data/silo-llnl-4.10.2.real/tools/browser/file.c:616:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(suffix, " [%drd occurrence]", occur); data/silo-llnl-4.10.2.real/tools/browser/file.c:618:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(suffix, " [%dth occurrence]", occur); data/silo-llnl-4.10.2.real/tools/browser/file.c:858:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *s, buf[64]; data/silo-llnl-4.10.2.real/tools/browser/file.c:881:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "'<i>%d'", n); data/silo-llnl-4.10.2.real/tools/browser/file.c:890:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "'<f>%g'", d); data/silo-llnl-4.10.2.real/tools/browser/file.c:899:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "'<d>%.30g'", d); data/silo-llnl-4.10.2.real/tools/browser/file.c:911:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (obj->pdb_names[i], "'<s>"); data/silo-llnl-4.10.2.real/tools/browser/file.c:992:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64], fmt[64]; data/silo-llnl-4.10.2.real/tools/browser/file.c:1025:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "%d", mmadj->nblocks); data/silo-llnl-4.10.2.real/tools/browser/file.c:1033:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "%d", mmadj->nblocks); data/silo-llnl-4.10.2.real/tools/browser/file.c:1045:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "%d", mmadj->lneighbors); data/silo-llnl-4.10.2.real/tools/browser/file.c:1054:8: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "%d", mmadj->lneighbors); data/silo-llnl-4.10.2.real/tools/browser/file.c:1068:8: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "%d", mmadj->lneighbors); data/silo-llnl-4.10.2.real/tools/browser/file.c:1082:8: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "%d", mmadj->lneighbors); data/silo-llnl-4.10.2.real/tools/browser/file.c:1091:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "%d", DB_INT); data/silo-llnl-4.10.2.real/tools/browser/file.c:1102:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char aname[32]; data/silo-llnl-4.10.2.real/tools/browser/file.c:1105:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fmt, "nodelist%%0%dd", digits); data/silo-llnl-4.10.2.real/tools/browser/file.c:1114:14: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "%d", mmadj->lnodelists[i]); data/silo-llnl-4.10.2.real/tools/browser/file.c:1121:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fmt, "zonelist%%0%dd", digits); data/silo-llnl-4.10.2.real/tools/browser/file.c:1130:14: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "%d", mmadj->lzonelists[i]); data/silo-llnl-4.10.2.real/tools/browser/file.c:1162:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64], bufi[64], buff[64]; data/silo-llnl-4.10.2.real/tools/browser/file.c:1194:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "%d", gm->num_segments); data/silo-llnl-4.10.2.real/tools/browser/file.c:1202:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "%d", gm->num_segments); data/silo-llnl-4.10.2.real/tools/browser/file.c:1210:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "%d", gm->num_segments); data/silo-llnl-4.10.2.real/tools/browser/file.c:1224:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (bufi, "%d", DB_INT); data/silo-llnl-4.10.2.real/tools/browser/file.c:1235:8: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buff, "%d", gm->fracs_data_type); data/silo-llnl-4.10.2.real/tools/browser/file.c:1246:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char aname[32]; data/silo-llnl-4.10.2.real/tools/browser/file.c:1259:14: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (bufi, "%d", gm->segment_lengths[i]); data/silo-llnl-4.10.2.real/tools/browser/file.c:1274:14: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buff, "%d", gm->segment_lengths[i]); data/silo-llnl-4.10.2.real/tools/browser/file.c:1326:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/silo-llnl-4.10.2.real/tools/browser/file.c:1371:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "%d", ca->nelems); data/silo-llnl-4.10.2.real/tools/browser/file.c:1379:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "%d", ca->datatype); data/silo-llnl-4.10.2.real/tools/browser/file.c:1394:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "%d", ca->elemlengths[i]); data/silo-llnl-4.10.2.real/tools/browser/file.c:1469:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwd[1024]; data/silo-llnl-4.10.2.real/tools/browser/file.c:1519:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/silo-llnl-4.10.2.real/tools/browser/file.c:1530:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "%d", ca->datatype); data/silo-llnl-4.10.2.real/tools/browser/file.c:1548:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "%d", ca->elemlengths[elmtno]); data/silo-llnl-4.10.2.real/tools/browser/file.c:2282:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[1024], *base=NULL, buf[1024]; data/silo-llnl-4.10.2.real/tools/browser/file.c:2639:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*s_ptr, r_mem, nelmts); data/silo-llnl-4.10.2.real/tools/browser/file.c:2644:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buf, "primitive 'string'"); data/silo-llnl-4.10.2.real/tools/browser/file.c:2650:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "primitive %d", datatype); data/silo-llnl-4.10.2.real/tools/browser/file.c:2658:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buf, "array"); data/silo-llnl-4.10.2.real/tools/browser/file.c:2659:41: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. for (j=0; j<ndims; j++) sprintf(buf+strlen(buf), " %d", data/silo-llnl-4.10.2.real/tools/browser/file.c:2661:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf+strlen(buf), " (primitive %d)", datatype); data/silo-llnl-4.10.2.real/tools/browser/file.c:2830:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullname[1024]; data/silo-llnl-4.10.2.real/tools/browser/file.c:2893:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char a_cwd[1024], b_cwd[1024]; data/silo-llnl-4.10.2.real/tools/browser/file.c:3030:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[1024]; data/silo-llnl-4.10.2.real/tools/browser/file.c:3031:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(tmp, "Differencing: "); data/silo-llnl-4.10.2.real/tools/browser/func.c:142:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/silo-llnl-4.10.2.real/tools/browser/func.c:278:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ebuf[1024]; data/silo-llnl-4.10.2.real/tools/browser/func.c:283:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (ebuf, "close: inappropriate file symbol as arg-%d: ", i+1); data/silo-llnl-4.10.2.real/tools/browser/func.c:348:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/silo-llnl-4.10.2.real/tools/browser/func.c:439:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[32]; data/silo-llnl-4.10.2.real/tools/browser/func.c:441:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "$%d", nopands+1); data/silo-llnl-4.10.2.real/tools/browser/func.c:619:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[8192], a_buf[32], b_buf[32]; data/silo-llnl-4.10.2.real/tools/browser/func.c:624:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(a_buf, "Argument %d", i+1); data/silo-llnl-4.10.2.real/tools/browser/func.c:628:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(b_buf, "Argument %d", nopands/2+i+1); data/silo-llnl-4.10.2.real/tools/browser/func.c:1009:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/silo-llnl-4.10.2.real/tools/browser/func.c:1077:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/silo-llnl-4.10.2.real/tools/browser/func.c:1092:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/silo-llnl-4.10.2.real/tools/browser/func.c:1107:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/silo-llnl-4.10.2.real/tools/browser/func.c:1122:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/silo-llnl-4.10.2.real/tools/browser/func.c:1382:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256], *needle, nselected=0; data/silo-llnl-4.10.2.real/tools/browser/func.c:1383:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwd[1024], *subdir; data/silo-llnl-4.10.2.real/tools/browser/func.c:1800:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *s, buf[32]; data/silo-llnl-4.10.2.real/tools/browser/func.c:1808:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "%d", num_int(argv[0])); data/silo-llnl-4.10.2.real/tools/browser/func.c:2003:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL==(f=fopen(fname, fmode))) { data/silo-llnl-4.10.2.real/tools/browser/func.c:2219:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *structname, *name[32]; data/silo-llnl-4.10.2.real/tools/browser/func.c:2350:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/silo-llnl-4.10.2.real/tools/browser/lex.c:172:23: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (NULL==(stream=fopen(fname, "r"))) { data/silo-llnl-4.10.2.real/tools/browser/lex.c:373:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[1024]; data/silo-llnl-4.10.2.real/tools/browser/lex.c:396:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[4096]; data/silo-llnl-4.10.2.real/tools/browser/lex.c:587:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwd[1024]; data/silo-llnl-4.10.2.real/tools/browser/lex.c:622:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(f->lexeme, ">>"); data/silo-llnl-4.10.2.real/tools/browser/num.c:189:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/silo-llnl-4.10.2.real/tools/browser/num.c:196:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf+2*i, "%02x", *(mem+i)); data/silo-llnl-4.10.2.real/tools/browser/num.c:206:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf+i*8+j, "%c", u&mask?'1':'0'); data/silo-llnl-4.10.2.real/tools/browser/num.c:229:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf+i*8+j, "%c", u&mask?'1':'0'); data/silo-llnl-4.10.2.real/tools/browser/output.c:255:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4096]; data/silo-llnl-4.10.2.real/tools/browser/output.c:382:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4096]; data/silo-llnl-4.10.2.real/tools/browser/output.c:569:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/silo-llnl-4.10.2.real/tools/browser/output.c:717:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/silo-llnl-4.10.2.real/tools/browser/output.c:774:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (buf, "%d", f->field[i].offset[j]+n/stride); data/silo-llnl-4.10.2.real/tools/browser/output.c:853:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4096], *s, *nextline; data/silo-llnl-4.10.2.real/tools/browser/output.c:1136:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/silo-llnl-4.10.2.real/tools/browser/parse.c:418:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char opname[64]; data/silo-llnl-4.10.2.real/tools/browser/parse.c:419:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(opname, "op"); data/silo-llnl-4.10.2.real/tools/browser/parse.c:429:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(opname, "\"op"); data/silo-llnl-4.10.2.real/tools/browser/parse.c:490:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *lexeme, buf[1024], *s, *fmode; data/silo-llnl-4.10.2.real/tools/browser/prim.c:685:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024], *s; data/silo-llnl-4.10.2.real/tools/browser/prim.c:699:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buf, "b16"); data/silo-llnl-4.10.2.real/tools/browser/prim.c:701:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buf, "b8"); data/silo-llnl-4.10.2.real/tools/browser/prim.c:703:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buf, "b2"); data/silo-llnl-4.10.2.real/tools/browser/prim.c:728:25: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buf, "%s"); data/silo-llnl-4.10.2.real/tools/browser/prim.c:747:25: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf+i, "%c", u&mask?'1':'0'); data/silo-llnl-4.10.2.real/tools/browser/prim.c:766:29: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf+i*8+j, "%c", u&mask?'1':'0'); data/silo-llnl-4.10.2.real/tools/browser/prim.c:791:29: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf+i*8+j, "%c", u&mask?'1':'0'); data/silo-llnl-4.10.2.real/tools/browser/prim.c:811:29: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf+i*8+j, "%c", u&mask?'1':'0'); data/silo-llnl-4.10.2.real/tools/browser/prim.c:831:29: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf+i*8+j, "%c", u&mask?'1':'0'); data/silo-llnl-4.10.2.real/tools/browser/prim.c:843:25: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf+2*i, "%02x", *((unsigned char*)mem+i)); data/silo-llnl-4.10.2.real/tools/browser/prim.c:853:29: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf+i*8+j, "%c", u&mask?'1':'0'); data/silo-llnl-4.10.2.real/tools/browser/prim.c:870:25: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf+2*i, "%02x", *((unsigned char*)mem+i)); data/silo-llnl-4.10.2.real/tools/browser/prim.c:880:29: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf+i*8+j, "%c", u&mask?'1':'0'); data/silo-llnl-4.10.2.real/tools/browser/stc.c:537:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/silo-llnl-4.10.2.real/tools/browser/stc.c:786:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwd[1024], buf[1024]; data/silo-llnl-4.10.2.real/tools/browser/stc.c:799:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char a_cwd[1024], b_cwd[1024]; data/silo-llnl-4.10.2.real/tools/browser/stc.c:919:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (cwd, "Differencing: "); data/silo-llnl-4.10.2.real/tools/browser/str.c:240:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024], c; data/silo-llnl-4.10.2.real/tools/browser/str.c:271:20: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf+at, "\\%02x", (unsigned char)c); data/silo-llnl-4.10.2.real/tools/browser/str.c:303:20: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf+at, "\\%02x", (unsigned char)c); data/silo-llnl-4.10.2.real/tools/browser/str.c:312:20: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf+at, "\\%03o", (unsigned char)c); data/silo-llnl-4.10.2.real/tools/browser/switch.c:243:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/silo-llnl-4.10.2.real/tools/browser/switch.c:261:24: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (buffer[0]) strcat(buffer, ", "); data/silo-llnl-4.10.2.real/tools/browser/switch.c:289:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char synopsis[256]; data/silo-llnl-4.10.2.real/tools/browser/switch.c:599:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[1024]; data/silo-llnl-4.10.2.real/tools/browser/switch.c:622:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[3]; data/silo-llnl-4.10.2.real/tools/browser/switch.c:623:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "-%c", *s); data/silo-llnl-4.10.2.real/tools/browser/sym.c:267:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[32]; data/silo-llnl-4.10.2.real/tools/browser/sym.c:268:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "$%d", nopands+1); data/silo-llnl-4.10.2.real/tools/browser/sym.c:575:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullname[1024], *rest; data/silo-llnl-4.10.2.real/tools/browser/sym.c:624:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullname[1024], *retval; data/silo-llnl-4.10.2.real/tools/browser/sym.c:656:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullname[1024]; data/silo-llnl-4.10.2.real/tools/browser/sym.c:789:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[64]; data/silo-llnl-4.10.2.real/tools/browser/sym.c:915:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "%d", OUT_NROWS); data/silo-llnl-4.10.2.real/tools/browser/sym.c:924:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "%d", OUT_NCOLS); data/silo-llnl-4.10.2.real/tools/browser/sym.c:996:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "%%1.%dg", FLT_DIG); data/silo-llnl-4.10.2.real/tools/browser/sym.c:1001:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "%%1.%dg", DBL_DIG); data/silo-llnl-4.10.2.real/tools/json/jsonify_silo_example.c:51:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char tmp[32]; data/silo-llnl-4.10.2.real/tools/json/jsonify_silo_example.c:243:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[32]; data/silo-llnl-4.10.2.real/tools/mapred/stream_silo.c:67:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/silo-llnl-4.10.2.real/tools/mapred/stream_silo.c:71:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "%llx:%d", gzoneno, zidx); data/silo-llnl-4.10.2.real/tools/mapred/stream_silo.c:73:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "%llx:%d:%d", gzoneno, dom, zidx); data/silo-llnl-4.10.2.real/tools/mapred/stream_silo.c:78:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "%d", zidx); data/silo-llnl-4.10.2.real/tools/mapred/stream_silo.c:80:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "%d:%d", dom, zidx); data/silo-llnl-4.10.2.real/tools/mapred/stream_silo.c:104:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/silo-llnl-4.10.2.real/tools/mapred/stream_silo.c:124:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/silo-llnl-4.10.2.real/tools/mapred/stream_silo.c:132:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/silo-llnl-4.10.2.real/tools/mapred/stream_silo.c:164:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/silo-llnl-4.10.2.real/tools/mapred/stream_silo.c:171:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "n%1d=%d", k, nodeid); data/silo-llnl-4.10.2.real/tools/mapred/stream_silo.c:182:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(tmp, "x%1d=%f$y%1d=%f$z%1d=%f", k, x, k, y, k, z); data/silo-llnl-4.10.2.real/tools/mapred/stream_silo.c:265:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[1024]; data/silo-llnl-4.10.2.real/tools/mapred/stream_silo.c:266:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char varname[256]; data/silo-llnl-4.10.2.real/tools/python/pydbfile.cpp:262:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[256]; data/silo-llnl-4.10.2.real/tools/python/pydbfile.cpp:278:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[256]; data/silo-llnl-4.10.2.real/tools/python/pydbfile.cpp:762:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(s, "<closed DBfile object>"); data/silo-llnl-4.10.2.real/tools/python/pydbfile.cpp:780:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[1000]; data/silo-llnl-4.10.2.real/tools/python/pydbfile.cpp:801:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[1000]; data/silo-llnl-4.10.2.real/tools/python/pydbtoc.cpp:123:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[1000]; data/silo-llnl-4.10.2.real/tools/silex/Explorer.cpp:91:51: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). filemenu->addAction( "&Open", this, SLOT(open()), tr("Ctrl+O") ); data/silo-llnl-4.10.2.real/tools/silex/Explorer.cpp:131:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). Explorer::open() data/silo-llnl-4.10.2.real/tools/silex/Explorer.h:87:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). void open(); data/silo-llnl-4.10.2.real/tools/silex/SiloArrayView.cpp:237:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[256]; data/silo-llnl-4.10.2.real/tools/silex/SiloArrayView.cpp:241:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "%-4d: %d", i, ((int*)var)[i]); data/silo-llnl-4.10.2.real/tools/silex/SiloArrayView.cpp:244:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "%-4d: %d", i, ((short*)var)[i]); data/silo-llnl-4.10.2.real/tools/silex/SiloArrayView.cpp:247:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "%-4d: %ld", i, ((long*)var)[i]); data/silo-llnl-4.10.2.real/tools/silex/SiloArrayView.cpp:250:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "%-4d: %lld", i, ((long long*)var)[i]); data/silo-llnl-4.10.2.real/tools/silex/SiloArrayView.cpp:253:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "%-4d: %g", i, ((float*)var)[i]); data/silo-llnl-4.10.2.real/tools/silex/SiloArrayView.cpp:256:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "%-4d: %g", i, ((double*)var)[i]); data/silo-llnl-4.10.2.real/tools/silex/SiloArrayView.cpp:259:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "%-4d: %hhd", i, ((char*)var)[i]); data/silo-llnl-4.10.2.real/tools/silex/SiloArrayView.cpp:262:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "%-4d: NOTYPE", i); data/silo-llnl-4.10.2.real/tools/silex/SiloArrayView.cpp:265:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "%-4d: type ???", i); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:191:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[256] = ""; data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:197:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(value, "%d", *((int*)comp)); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:202:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(value, "%d", *((short*)comp)); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:207:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(value, "%ld", *((long*)comp)); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:212:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(value, "%lld", *((long long*)comp)); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:217:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(value, "%g", *((float*)comp)); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:221:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(value, "%g", *((double*)comp)); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:229:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(value, "NOTYPE"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:251:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_COLLINEAR) strcat(value, " (DB_COLLINEAR)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:252:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_NONCOLLINEAR) strcat(value, " (DB_NONCOLLINEAR)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:256:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_NOTCENT) strcat(value, " (DB_NOTCENT)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:257:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_NODECENT) strcat(value, " (DB_NODECENT)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:258:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_ZONECENT) strcat(value, " (DB_ZONECENT)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:259:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_FACECENT) strcat(value, " (DB_FACECENT)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:260:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_BNDCENT) strcat(value, " (DB_BNDCENT)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:261:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_EDGECENT) strcat(value, " (DB_EDGECENT)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:262:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_BLOCKCENT) strcat(value, " (DB_BLOCKCENT)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:266:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_ROWMAJOR) strcat(value, " (DB_ROWMAJOR)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:267:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_COLMAJOR) strcat(value, " (DB_COLMAJOR)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:271:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_CARTESIAN) strcat(value, " (DB_CARTESIAN)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:272:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_CYLINDRICAL) strcat(value, " (DB_CYLINDRICAL)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:273:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_SPHERICAL) strcat(value, " (DB_SPHERICAL)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:274:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_NUMERICAL) strcat(value, " (DB_NUMERICAL)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:275:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_OTHER) strcat(value, " (DB_OTHER)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:279:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_AREA) strcat(value, " (DB_AREA)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:280:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_VOLUME) strcat(value, " (DB_VOLUME)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:284:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_RECTILINEAR) strcat(value, " (DB_RECTILINEAR)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:285:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_CURVILINEAR) strcat(value, " (DB_CURVILINEAR)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:289:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_INT) strcat(value, " (DB_INT)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:290:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_SHORT) strcat(value, " (DB_SHORT)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:291:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_LONG) strcat(value, " (DB_LONG)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:292:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_FLOAT) strcat(value, " (DB_FLOAT)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:293:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_DOUBLE) strcat(value, " (DB_DOUBLE)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:294:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_CHAR) strcat(value, " (DB_CHAR)"); data/silo-llnl-4.10.2.real/tools/silex/SiloObjectView.cpp:295:46: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (ival == DB_NOTYPE) strcat(value, " (DB_NOTYPE)"); data/silo-llnl-4.10.2.real/tools/silex/SiloValueView.cpp:106:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[4096]; data/silo-llnl-4.10.2.real/tools/silex/SiloValueView.cpp:110:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "int: %d", *((int*)var)); data/silo-llnl-4.10.2.real/tools/silex/SiloValueView.cpp:114:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "short: %d", *((short*)var)); data/silo-llnl-4.10.2.real/tools/silex/SiloValueView.cpp:117:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "long: %ld", *((long*)var)); data/silo-llnl-4.10.2.real/tools/silex/SiloValueView.cpp:120:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "long long: %lld", *((long long*)var)); data/silo-llnl-4.10.2.real/tools/silex/SiloValueView.cpp:123:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "float: %g", *((float*)var)); data/silo-llnl-4.10.2.real/tools/silex/SiloValueView.cpp:126:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "double: %g", *((double*)var)); data/silo-llnl-4.10.2.real/tools/silex/SiloValueView.cpp:130:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "char: %c", *((char*)var)); data/silo-llnl-4.10.2.real/tools/silex/SiloValueView.cpp:135:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "NOTYPE: ???"); data/silo-llnl-4.10.2.real/tools/silex/SiloValueView.cpp:138:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "???: ???"); data/silo-llnl-4.10.2.real/tools/silock/silock.c:99:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[1024]; data/silo-llnl-4.10.2.real/tools/silock/silock.c:111:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char lastDir[1024], lastVar[1024]; data/silo-llnl-4.10.2.real/tools/silock/silock.c:112:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errMsg[128]; data/silo-llnl-4.10.2.real/tools/silock/silock.c:119:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case FP_SNAN: strcpy(errMsg,"signaling NaN"); break; data/silo-llnl-4.10.2.real/tools/silock/silock.c:120:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case FP_QNAN: strcpy(errMsg,"quiet NaN"); break; data/silo-llnl-4.10.2.real/tools/silock/silock.c:121:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case FP_NINF: strcpy(errMsg,"negative infinity"); break; data/silo-llnl-4.10.2.real/tools/silock/silock.c:122:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case FP_PINF: strcpy(errMsg,"positive infinity"); break; data/silo-llnl-4.10.2.real/tools/silock/silock.c:123:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case FP_NDENORM: strcpy(errMsg,"negative denormalized non-zero"); break; data/silo-llnl-4.10.2.real/tools/silock/silock.c:124:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case FP_PDENORM: strcpy(errMsg,"positive denormalized non-zero"); break; data/silo-llnl-4.10.2.real/tools/silock/silock.c:125:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case FP_NZERO: strcpy(errMsg,"negative zero"); break; data/silo-llnl-4.10.2.real/tools/silock/silock.c:126:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case FP_PZERO: strcpy(errMsg,"positive zero"); break; data/silo-llnl-4.10.2.real/tools/silock/silock.c:127:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case FP_NNORM: strcpy(errMsg,"negative normalized non-zero"); break; data/silo-llnl-4.10.2.real/tools/silock/silock.c:128:24: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. case FP_PNORM: strcpy(errMsg,"positive normalized non-zero"); break; data/silo-llnl-4.10.2.real/tools/silock/silock.c:132:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(errMsg, "unkown NaN"); data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:831:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). listno++, list += strlen(list) + 1) { data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:1180:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(work, path, sizeof(work)); data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:1372:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(path, "/"); data/silo-llnl-4.10.2.real/src/filters/f_ale3d.c:1981:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s_data[i] = ALLOC_N(char, strlen(t) + 6); data/silo-llnl-4.10.2.real/src/filters/f_sample.c:334:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (int)strlen(f_debug_name[id]), "", data/silo-llnl-4.10.2.real/src/fpzip/read.h:40:16: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int byte = fgetc(file); data/silo-llnl-4.10.2.real/src/hdf5_drv/H5FDsilo.c:208:41: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define HDread(F,M,Z) read(F,M,Z) data/silo-llnl-4.10.2.real/src/hdf5_drv/H5FDsilo.c:1303:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(name, "LLNLsilo", (size_t)8); data/silo-llnl-4.10.2.real/src/hdf5_drv/H5FDsilo.c:1483:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (NULL == (file->log_name = (char*) malloc(strlen(name)+strlen(ext)+1))) data/silo-llnl-4.10.2.real/src/hdf5_drv/H5FDsilo.c:1483:67: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (NULL == (file->log_name = (char*) malloc(strlen(name)+strlen(ext)+1))) data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:854:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define ENDOF(S) ((S)+strlen(S)) data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:1721:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). flen = strlen(fmtstr); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:1897:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). H5Tset_size(stype, strlen(s)+1); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:3199:15: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy(chararray, ptr+8, 4); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:3215:15: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy(chararray, ptr+9, 5); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:3235:20: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy(chararray, ptr+6, 1); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:3282:23: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy(chararray, ptr+6, 2); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:3344:21: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy(chararray, ptr+6, 4); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:3368:21: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy(chararray, ptr+5, 2); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:3406:20: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy(chararray, ptr+5, 2); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:3657:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int n = strlen(tmp)+1; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:3666:21: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy((char *)(*buf), tmp, n); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:4495:32: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. if (strcmp(full, "/")) strcat(full, "/"); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5326:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = strlen(finfo)+1; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5341:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(H5_VERS_SUBRELEASE) ? "-" : "", H5_VERS_SUBRELEASE); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5342:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = strlen(hdf5VString)+1; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5350:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = strlen(hdf5VString)+1; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5421:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen(msg); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5427:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strlen(msg) + strlen(tmp) + 1) >= sizeof(msg)) data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5427:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strlen(msg) + strlen(tmp) + 1) >= sizeof(msg)) data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5430:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n += strlen(tmp); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5738:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). t = parent+strlen(parent); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5744:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dotdot = (char *)malloc(strlen(name)+4); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5914:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(name, "/"); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:5918:17: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(name, "/"); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:6339:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). complen = strlen(compname); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:6588:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). msize += strlen(obj->pdb_names[i]+4); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:6589:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fsize += strlen(obj->pdb_names[i]+4); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:6664:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). msize += strlen(obj->pdb_names[i]) + 1; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:6665:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fsize += strlen(obj->pdb_names[i]) + 1; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:6723:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(obj->pdb_names[i]+4)-1; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:6734:17: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy((char*)(object+moffset), obj->pdb_names[i]+4, len); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:6834:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(obj->pdb_names[i])+1; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:8121:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(m.xvarname)) { data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:12249:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i=len=0; i<nmesh; i++) len += strlen(meshnames[i])+1; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:12254:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(meshnames[i]); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:12293:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(_mm._file_ns)+1; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:12299:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(_mm._block_ns)+1; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:13143:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i=len=0; i<nvars; i++) len += strlen(varnames[i])+1; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:13148:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(varnames[i]); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:13179:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(_mm._file_ns)+1; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:13185:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(_mm._block_ns)+1; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:13437:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i=len=0; i<nmats; i++) len += strlen(matnames[i])+1; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:13442:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(matnames[i]); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:13484:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(_mm._file_ns)+1; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:13490:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(_mm._block_ns)+1; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:13730:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i=len=0; i<nspec; i++) len += strlen(specnames[i])+1; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:13735:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(specnames[i]); data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:13774:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(_mm._file_ns)+1; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:13780:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(_mm._block_ns)+1; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:14536:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i=len=0; i<nelmts; i++) len += strlen(elmtnames[i])+1; data/silo-llnl-4.10.2.real/src/hdf5_drv/silo_hdf5.c:14541:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(elmtnames[i]); data/silo-llnl-4.10.2.real/src/hzip/hzmread.cpp:95:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). for (unsigned read; left && stream->avail; left -= read) { data/silo-llnl-4.10.2.real/src/hzip/hzmread.cpp:95:54: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). for (unsigned read; left && stream->avail; left -= read) { data/silo-llnl-4.10.2.real/src/hzip/hzmread.cpp:97:30: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). for (unsigned i = 0; i < read; i++) data/silo-llnl-4.10.2.real/src/hzip/hzmread.cpp:100:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). stream->avail -= read; data/silo-llnl-4.10.2.real/src/hzip/hznread.cpp:79:1: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read( data/silo-llnl-4.10.2.real/src/hzip/hznread.cpp:131:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). nodes = read(stream->cdecoder, node, mesh, count); data/silo-llnl-4.10.2.real/src/hzip/hznread.cpp:134:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). nodes = read(stream->sdecoder, node, mesh, count); data/silo-llnl-4.10.2.real/src/hzip/hznread.cpp:137:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). nodes = read(stream->idecoder, node, mesh, count); data/silo-llnl-4.10.2.real/src/hzip/hznread.cpp:140:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). nodes = read(stream->fdecoder, node, mesh, count); data/silo-llnl-4.10.2.real/src/hzip/hznread.cpp:143:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). nodes = read(stream->ddecoder, node, mesh, count); data/silo-llnl-4.10.2.real/src/hzip/ibstream.h:101:38: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). IBSTREAMfile(FILE* in) : file(in), read(0), status(IBSTREAM_OK) {} data/silo-llnl-4.10.2.real/src/hzip/ibstream.h:104:13: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int c = fgetc(file); data/silo-llnl-4.10.2.real/src/hzip/ibstream.h:132:33: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). size_t bytes() const { return read; } data/silo-llnl-4.10.2.real/src/hzip/ibstream.h:136:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). size_t read; data/silo-llnl-4.10.2.real/src/hzip/ibstream.h:157:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(0), data/silo-llnl-4.10.2.real/src/hzip/ibstream.h:193:33: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). size_t bytes() const { return read; } data/silo-llnl-4.10.2.real/src/hzip/ibstream.h:240:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). size_t read; data/silo-llnl-4.10.2.real/src/netcdf/obj.c:247:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name = (char *)strtok(name + strlen(name) + 1, delim); data/silo-llnl-4.10.2.real/src/netcdf/silo_netcdf.c:324:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen(str); data/silo-llnl-4.10.2.real/src/pdb/pdb.c:915:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(index, "("); data/silo-llnl-4.10.2.real/src/pdb/pdb.c:937:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(index) > 1) { data/silo-llnl-4.10.2.real/src/pdb/pdb.c:938:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). index[strlen(index)-1] = ')'; data/silo-llnl-4.10.2.real/src/pdb/pdb.c:1154:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str, name, sizeof(str)); data/silo-llnl-4.10.2.real/src/pdb/pdb.h:184:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). c = s[strlen(s) - 1]; \ data/silo-llnl-4.10.2.real/src/pdb/pdb.h:191:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). c = s[strlen(s) - 1]; \ data/silo-llnl-4.10.2.real/src/pdb/pdb.h:193:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). {s[strlen(s) - 1] = '\0'; \ data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:96:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(name, "/"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:99:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (name[strlen(name) - 1] != '/') strcat(name, "/"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:99:42: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. if (name[strlen(name) - 1] != '/') strcat(name, "/"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:108:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name[strlen(name) - 1] = '\0'; data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:110:6: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(name, "/"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:197:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (pattern[strlen(pattern) - 1] == '/') strcat(pattern, "*"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:197:47: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. if (pattern[strlen(pattern) - 1] == '/') strcat(pattern, "*"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:200:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (pattern[strlen(pattern) - 1] != '/') { data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:201:9: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(pattern, "/"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:204:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(pattern, "*"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:206:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pattern[strlen(pattern) - 1] = '\0'; data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:208:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pattern[strlen(pattern) - 1] = '\0'; data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:213:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(pattern, "/"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:219:25: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (path == NULL) strcpy(pattern, "*"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:239:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(pattern, pattern+1, strlen(pattern+1)+1); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:276:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else head = strlen(pattern) - strlen(strrchr(pattern, '/')) + 1; data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:276:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else head = strlen(pattern) - strlen(strrchr(pattern, '/')) + 1; data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:278:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strlen(name) == 0) || data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:281:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (strchr(name, '/') != ((name + strlen(name) - 1))))) data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:340:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(cwd, "/"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:344:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cwdlen = strlen(cwd); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:405:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int onlen = strlen(outname); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:416:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int onlen = strlen(outname); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:418:17: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(outname, "/"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:424:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strlen(inname) > 0) && data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:425:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (inname[strlen(inname) - 1] == '/') && data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:426:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ((strlen(outname) == 0) || data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:427:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (outname[strlen(outname) - 1] != '/'))) data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:428:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(outname, "/"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:431:28: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (outname[0] == '\0') strcpy(outname, "/"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:493:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (name[strlen(name) - 1] != '/') strcat(name, "/"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:493:39: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. if (name[strlen(name) - 1] != '/') strcat(name, "/"); data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:508:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). head[strlen(head) - 1] = '\0'; data/silo-llnl-4.10.2.real/src/pdb/pdbdir.c:513:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int hlen = strlen(head); data/silo-llnl-4.10.2.real/src/pdb/pdbio.c:154:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ni = strlen(Pbuffer); data/silo-llnl-4.10.2.real/src/pdb/pdbmm.c:431:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(vals) > 7) align->struct_alignment = vals[7]; data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:1609:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen(outfor); data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:1835:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). io_write(_lite_PD_tbuffer, 1, strlen(_lite_PD_tbuffer), fp); data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:2120:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). io_write(_lite_PD_tbuffer, 1, strlen(_lite_PD_tbuffer), fp); data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:2185:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ns = strlen(s); data/silo-llnl-4.10.2.real/src/pdb/pdlow.c:2201:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pl = _lite_PD_tbuffer + strlen(_lite_PD_tbuffer); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:426:32: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (strchr(s, '*') != NULL) strcpy(bf, "*"); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:460:32: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (strchr(s, '*') != NULL) strcpy(bf, "*"); data/silo-llnl-4.10.2.real/src/pdb/pdmemb.c:701:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). expr[strlen(expr) - 1] = '\0'; data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:998:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = strlen(s) - 1; i >= 0; i--) { data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:1777:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s, FRAME(lex_bf)+start, nc); data/silo-llnl-4.10.2.real/src/pdb/pdpath.c:1788:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tok = text + strlen(text); data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:180:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(index, "("); data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:192:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(index) > 1) { data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:193:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). index[strlen(index)-1] = ')'; data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:263:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(s); data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:1052:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (t = s + strlen(s); t > s; t--) data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:1085:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (t = s + strlen(s); t > s; t--) { data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:1356:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen(s); data/silo-llnl-4.10.2.real/src/pdb/pdrdwr.c:1369:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (s + strlen(expr) + 1 >= expr) data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:264:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_outname, inname, sizeof(_outname)); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:978:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name = ALLOC_N(char, strlen(name_in)+1); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:1015:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tnmlen = strlen(tname); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:1062:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *var = ALLOC_N(char, strlen(lit) + 1); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:1274:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (*filename, mvdbspec, len_filename); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:1276:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len_varname = strlen(mvdbspec) - (len_filename+1); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:1290:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (*varname, &mvdbspec[len_filename+1], len_varname); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:1296:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (&((*varname)[1]), &mvdbspec[len_filename+1], len_varname); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:1304:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *varname = ALLOC_N (char, strlen(mvdbspec)+1); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:1335:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lpath = strlen (path) ; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:2245:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). long count = (long) strlen(finfo) + 1; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:2422:21: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(name, "/"); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:2430:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(name, "/"); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:2550:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s = ALLOC_N(char, strlen(ep->type) + 1); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:2988:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lstr = strlen(list[i]); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:3163:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *newname = (char*)malloc(strlen(varname)+2); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:5387:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (um->nnodes>0 && (flname != NULL && strlen(flname) > 0) data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:5427:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (um->nnodes>0 && (zlname != NULL && strlen(zlname) > 0) data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:7546:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). acc += strlen(elemnames[i]) + 1; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:7553:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant character. strncpy(cur, ";", 1); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:7555:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(elemnames[i]); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:7556:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(cur, elemnames[i], len); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:8316:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(meshnames[i]) + 1; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:8327:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len2 = strlen(meshnames[i]); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:8328:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(cur, meshnames[i], len2); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:8330:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant character. strncpy(cur, ";", 1); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:8404:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). count[0] = strlen(_mm._file_ns)+1; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:8410:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). count[0] = strlen(_mm._block_ns)+1; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:8817:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(varnames[i]) + 1; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:8828:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len2 = strlen(varnames[i]); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:8829:12: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(cur, varnames[i], len2); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:8831:12: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant character. strncpy(cur, ";", 1); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:8866:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). count[0] = strlen(_mm._file_ns)+1; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:8872:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). count[0] = strlen(_mm._block_ns)+1; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:9003:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(matnames[i]) + 1; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:9014:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len2 = strlen(matnames[i]); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:9015:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(cur, matnames[i], len2); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:9017:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant character. strncpy(cur, ";", 1); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:9101:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). count[0] = strlen(_mm._file_ns)+1; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:9107:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). count[0] = strlen(_mm._block_ns)+1; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:9211:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(specnames[i]) + 1; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:9222:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len2 = strlen(specnames[i]); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:9223:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(cur, specnames[i], len2); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:9225:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant character. strncpy(cur, ";", 1); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:9293:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). count[0] = strlen(_mm._file_ns)+1; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:9299:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). count[0] = strlen(_mm._block_ns)+1; data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:12559:17: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(out, "/"); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:12562:13: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(out, "/"); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb.c:12572:13: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(out, "_"); data/silo-llnl-4.10.2.real/src/pdb_drv/silo_pdb_private.h:90:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define SC_strdup(S) (strcpy(SCALLOC_N(char,strlen((S))+1),(S))) data/silo-llnl-4.10.2.real/src/score/scctla.c:707:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sz = strlen(s) + 2; data/silo-llnl-4.10.2.real/src/score/scctla.c:739:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(s) + 1; data/silo-llnl-4.10.2.real/src/score/scctla.c:809:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(s, r, strlen(r)+1); data/silo-llnl-4.10.2.real/src/score/scctla.c:814:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). t = s + strlen(s) + 1; data/silo-llnl-4.10.2.real/src/score/scctla.c:857:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = strlen(s); data/silo-llnl-4.10.2.real/src/score/scctla.c:872:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s += strlen(s) + 1; data/silo-llnl-4.10.2.real/src/score/schash.c:158:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(s); data/silo-llnl-4.10.2.real/src/silo/silo.c:340:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(db_errfunc, fname, sizeof(db_errfunc) - 1); data/silo-llnl-4.10.2.real/src/silo/silo.c:351:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(old_s, s, sizeof(old_s)); data/silo-llnl-4.10.2.real/src/silo/silo.c:385:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). elen = strlen(db_strerror(errorno)); data/silo-llnl-4.10.2.real/src/silo/silo.c:386:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (fname && *fname) flen = strlen(fname) + 2; data/silo-llnl-4.10.2.real/src/silo/silo.c:387:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (s && *s) slen = strlen(s) + 2; data/silo-llnl-4.10.2.real/src/silo/silo.c:480:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(out, string, len); data/silo-llnl-4.10.2.real/src/silo/silo.c:535:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(p); data/silo-llnl-4.10.2.real/src/silo/silo.c:1513:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nopts += strlen(args[i]) - 1; data/silo-llnl-4.10.2.real/src/silo/silo.c:1625:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen (toc->curve_names[i]) + 1); data/silo-llnl-4.10.2.real/src/silo/silo.c:1642:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen (toc->var_names[i]) + 1); data/silo-llnl-4.10.2.real/src/silo/silo.c:1659:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen (toc->mat_names[i]) + 1); data/silo-llnl-4.10.2.real/src/silo/silo.c:1676:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen (toc->matspecies_names[i]) + 1); data/silo-llnl-4.10.2.real/src/silo/silo.c:1694:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen (toc->array_names[i]) + 1); data/silo-llnl-4.10.2.real/src/silo/silo.c:1711:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen (toc->dir_names[i]) + 1); data/silo-llnl-4.10.2.real/src/silo/silo.c:1728:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen (toc->multimesh_names[i]) + 1); data/silo-llnl-4.10.2.real/src/silo/silo.c:1745:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen (toc->qmesh_names[i]) + 1); data/silo-llnl-4.10.2.real/src/silo/silo.c:1761:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen (toc->ucdmesh_names[i]) + 1); data/silo-llnl-4.10.2.real/src/silo/silo.c:1777:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen (toc->ptmesh_names[i]) + 1); data/silo-llnl-4.10.2.real/src/silo/silo.c:1794:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen (toc->multivar_names[i]) + 1); data/silo-llnl-4.10.2.real/src/silo/silo.c:1811:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen (toc->multimat_names[i]) + 1); data/silo-llnl-4.10.2.real/src/silo/silo.c:1827:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen (toc->multimatspecies_names[i]) + 1); data/silo-llnl-4.10.2.real/src/silo/silo.c:1844:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen (toc->qvar_names[i]) + 1); data/silo-llnl-4.10.2.real/src/silo/silo.c:1860:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen (toc->ucdvar_names[i]) + 1); data/silo-llnl-4.10.2.real/src/silo/silo.c:1876:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen (toc->ptvar_names[i]) + 1); data/silo-llnl-4.10.2.real/src/silo/silo.c:1892:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen (toc->obj_names[i]) + 1); data/silo-llnl-4.10.2.real/src/silo/silo.c:2003:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s, name, b - name); data/silo-llnl-4.10.2.real/src/silo/silo.c:2472:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (var2, var, len); data/silo-llnl-4.10.2.real/src/silo/silo.c:2503:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(not_found); data/silo-llnl-4.10.2.real/src/silo/silo.c:2505:17: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(not_found, ";"); data/silo-llnl-4.10.2.real/src/silo/silo.c:2791:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SILO_Globals.compressionParams=ALLOC_N(char,strlen(s)+1); data/silo-llnl-4.10.2.real/src/silo/silo.c:3145:18: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((nbytes = read(fd, (char *)buf, 8)) == -1) { data/silo-llnl-4.10.2.real/src/silo/silo.c:4460:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen(DBGetCompression()); data/silo-llnl-4.10.2.real/src/silo/silo.c:4462:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tmpcs, DBGetCompression(), n); data/silo-llnl-4.10.2.real/src/silo/silo.c:4466:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen(SILO_VSTRING)+1; data/silo-llnl-4.10.2.real/src/silo/silo.c:9706:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). maxwidth = strlen(sorted_strs[0]); data/silo-llnl-4.10.2.real/src/silo/silo.c:9709:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). maxwidth = MAX(maxwidth, (int)strlen(sorted_strs[i])); data/silo-llnl-4.10.2.real/src/silo/silo.c:12190:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(strArray[i])+1; data/silo-llnl-4.10.2.real/src/silo/silo.c:12200:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(strArray[i]); data/silo-llnl-4.10.2.real/src/silo/silo.c:12537:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (pathname && strlen(pathname)) data/silo-llnl-4.10.2.real/src/silo/silo.c:12540:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (cwg && strlen(cwg)) data/silo-llnl-4.10.2.real/src/silo/silo.c:12576:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). { if (0 < strlen(pathname)) data/silo-llnl-4.10.2.real/src/silo/silo.c:12582:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i=(int)strlen(pathname)-1; 0<=i; --i) data/silo-llnl-4.10.2.real/src/silo/silo.c:12657:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). { if (0 < strlen(pathname)) data/silo-llnl-4.10.2.real/src/silo/silo.c:12665:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i=(int)strlen(tmp)-1; 0<=i; --i) data/silo-llnl-4.10.2.real/src/silo/silo.c:12697:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (0 < strlen(pathname)) data/silo-llnl-4.10.2.real/src/silo/silo.c:12717:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (0 < strlen(pathname)) data/silo-llnl-4.10.2.real/src/silo/silo.c:12752:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(b) == 0) data/silo-llnl-4.10.2.real/src/silo/silo.c:12754:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (strlen(a) == 0) data/silo-llnl-4.10.2.real/src/silo/silo.c:12867:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (0 < strlen(pathname)) data/silo-llnl-4.10.2.real/src/silo/silo.c:13033:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (0 < strlen(pathname)) data/silo-llnl-4.10.2.real/src/silo/silo.c:13121:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((c->name == 0) || (strlen(c->name) == 0)) data/silo-llnl-4.10.2.real/src/silo/silo.c:13122:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. { strcpy(tmp,"/"); data/silo-llnl-4.10.2.real/src/silo/silo.c:13127:16: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. { strcat(tmp,"/"); data/silo-llnl-4.10.2.real/src/silo/silo.c:13873:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen(s); data/silo-llnl-4.10.2.real/src/silo/silo_f.c:3412:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). to_copy = strlen(ca->elemnames[i]); data/silo-llnl-4.10.2.real/src/silo/silo_f.c:3478:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fstring = _cptofcd(DB_F77NULLSTRING, strlen(DB_F77NULLSTRING)); data/silo-llnl-4.10.2.real/src/silo/silo_f.c:3702:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(elemnames[i]); data/silo-llnl-4.10.2.real/src/silo/silo_json.c:374:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy(pb->buf + (pjhdr+12-jhdr),tmp,strlen(tmp)); /* overwrite ptr value w/buffer-offset */ data/silo-llnl-4.10.2.real/src/silo/silo_json.c:466:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(fd, buf, (size_t) s.st_size) != (ssize_t) s.st_size) data/silo-llnl-4.10.2.real/src/silo/silo_json.c:1414:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(diffval) == 0) return 0; data/silo-llnl-4.10.2.real/src/silo/silo_json.c:1636:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(sobj->pdb_names[i])-5; data/silo-llnl-4.10.2.real/src/silo/silo_json.c:1638:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tmp, sobj->pdb_names[i]+4, len); data/silo-llnl-4.10.2.real/src/silo/silo_json.c:1701:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(objnm, json_object_get_string(silo_name_obj), sizeof(objnm)); data/silo-llnl-4.10.2.real/src/silo/silo_json.c:1745:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(json_object_get_string(mobj))) data/silo-llnl-4.10.2.real/src/silo/silo_ns.c:88:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(newnode->sval, s, sizeof(newnode->sval)-1); data/silo-llnl-4.10.2.real/src/silo/silo_ns.c:550:5: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(retval, ns->fmt, ns->fmtptrs[0] - ns->fmt); data/silo-llnl-4.10.2.real/src/silo/silo_ns.c:570:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tmpfmt, ns->fmtptrs[i], ns->fmtptrs[i+1] - ns->fmtptrs[i]); data/silo-llnl-4.10.2.real/src/silo/silo_private.h:246:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(Alt) > 0) \ data/silo-llnl-4.10.2.real/src/silo/silo_private.h:267:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). write (DBDebugAPI, M, strlen(M)); \ data/silo-llnl-4.10.2.real/src/silo/silo_private.h:298:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). write (DBDebugAPI, M, strlen(M)); \ data/silo-llnl-4.10.2.real/src/silo/silo_private.h:372:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define STR_LASTCHAR(S) ((S)[strlen((S))-1]) data/silo-llnl-4.10.2.real/src/silo/silo_win32_compatibility.h:14:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define read _read data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:149:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). npath = ALLOC_N(char, strlen(path) + 1); data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:154:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lpath = strlen(path); data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1337:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return (strlen(taurus->title) + 1); data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1392:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return (strlen(taurus->title) + 1); data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1605:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int pos = strlen(varname) - 1; data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1629:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(path, varname, pos); data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1740:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy(ptr, &(taurus->title), strlen(taurus->title) + 1); data/silo-llnl-4.10.2.real/src/taurus/silo_taurus.c:1871:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(path, "/"); data/silo-llnl-4.10.2.real/src/taurus/taurus.c:492:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(taurus->fd, &buffer[ibuf], n) != n) { data/silo-llnl-4.10.2.real/src/taurus/taurus.c:1618:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). taurus->basename = ALLOC_N(char, strlen(basename) + 1); data/silo-llnl-4.10.2.real/src/taurus/taurus.c:1620:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). taurus->filename = ALLOC_N(char, strlen(basename) + 4); data/silo-llnl-4.10.2.real/src/taurus/taurus.c:1629:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(fd, ctl, size) != size) { data/silo-llnl-4.10.2.real/src/taurus/taurus.c:1688:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(fd, title, size) != size) { data/silo-llnl-4.10.2.real/tests/add_amr_mrgtree.c:349:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s1, s, len); data/silo-llnl-4.10.2.real/tests/alltypes.c:275:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(mesh_command) + 1; data/silo-llnl-4.10.2.real/tests/cpz1plt.c:136:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirs [i] = (char *) calloc(strlen(toc->dir_names[i])+1,sizeof(char)); data/silo-llnl-4.10.2.real/tests/empty.c:67:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(nm, #FUNCCALL, sizeof(nm)); \ data/silo-llnl-4.10.2.real/tests/grab.c:242:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(mesh_command) + 1; data/silo-llnl-4.10.2.real/tests/grab.c:291:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(mesh_command) + 1; data/silo-llnl-4.10.2.real/tests/ioperf.c:227:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n=strlen(argv[i])-1; data/silo-llnl-4.10.2.real/tests/ioperf.c:253:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n=strlen(argv[i])-1; data/silo-llnl-4.10.2.real/tests/ioperf.c:261:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n=strlen(argv[i])-1; data/silo-llnl-4.10.2.real/tests/ioperf_sec2.c:99:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return read(fd, buf, nbytes); data/silo-llnl-4.10.2.real/tests/listtypes.c:173:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dir_names[i] = ALLOC_N(char, 1+strlen(dbtoc->dir_names[i])+ data/silo-llnl-4.10.2.real/tests/listtypes.c:174:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(currentdir)); data/silo-llnl-4.10.2.real/tests/merge_block.c:200:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vars[i] = ALLOC_N (char, strlen (toc->multivar_names[i]) + 1); data/silo-llnl-4.10.2.real/tests/merge_block.c:775:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp (fName, baseName, strlen (baseName)) == 0) data/silo-llnl-4.10.2.real/tests/merge_block.c:782:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). files [nFiles] = ALLOC_N (char, (strlen(fName)+1)); data/silo-llnl-4.10.2.real/tests/namescheme.c:167:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(blockName, ":"); data/silo-llnl-4.10.2.real/tests/namescheme.c:172:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(blockName, ":"); data/silo-llnl-4.10.2.real/tests/namescheme.c:177:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(blockName, ":"); data/silo-llnl-4.10.2.real/tests/namescheme.c:229:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dims[0] = strlen(ns1)+1; data/silo-llnl-4.10.2.real/tests/namescheme.c:235:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dims[0] = strlen(ns2)+1; data/silo-llnl-4.10.2.real/tests/namescheme.c:237:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dims[0] = strlen(ns4)+1; data/silo-llnl-4.10.2.real/tests/onehex.c:333:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(mesh_command) + 1; data/silo-llnl-4.10.2.real/tests/oneprism.c:230:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(mesh_command) + 1; data/silo-llnl-4.10.2.real/tests/onepyramid.c:218:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(mesh_command) + 1; data/silo-llnl-4.10.2.real/tests/onetet.c:216:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(mesh_command) + 1; data/silo-llnl-4.10.2.real/tests/pdbtst.c:827:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(ca_w) + 1; data/silo-llnl-4.10.2.real/tests/specmix.c:548:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(coordnames[0],"x"); data/silo-llnl-4.10.2.real/tests/specmix.c:549:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(coordnames[1],"y"); data/silo-llnl-4.10.2.real/tests/std.c:63:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define CHECK_SYMBOL(A) if (!strncmp(str, #A, strlen(str))) return A data/silo-llnl-4.10.2.real/tests/std.c:66:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strncmp(tok, #A, strlen(#A))) \ data/silo-llnl-4.10.2.real/tests/std.c:78:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strncmp(tok, #A, strlen(#A))) \ data/silo-llnl-4.10.2.real/tests/std.c:80:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). driver_strs[driver_nstrs] = strdup(&tok[strlen(#A)]+1);\ data/silo-llnl-4.10.2.real/tests/std.c:87:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strncmp(tok, #A, strlen(#A))) \ data/silo-llnl-4.10.2.real/tests/std.c:89:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). driver_ints[driver_nints] = StringToDriver(&tok[strlen(#A)]+1);\ data/silo-llnl-4.10.2.real/tests/subhex.c:273:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(mesh_command) + 1; data/silo-llnl-4.10.2.real/tests/testall.c:1287:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(buf); data/silo-llnl-4.10.2.real/tests/testall.c:1291:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(buf); data/silo-llnl-4.10.2.real/tests/testpdb.c:263:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). group->comp_names[i] = MAKE_N(char, strlen(comp_names[i])+1); data/silo-llnl-4.10.2.real/tests/testpdb.c:265:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). group->pdb_names[i] = MAKE_N(char, strlen(pdb_names[i])+1); data/silo-llnl-4.10.2.real/tests/testpdb.c:268:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). group->type = MAKE_N(char, strlen(type)+1); data/silo-llnl-4.10.2.real/tests/testpdb.c:270:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). group->name = MAKE_N(char, strlen(name)+1); data/silo-llnl-4.10.2.real/tests/twohex.c:250:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(mesh_command) + 1; data/silo-llnl-4.10.2.real/tools/browser/browser.c:498:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (dir, text, n); data/silo-llnl-4.10.2.real/tools/browser/browser.c:540:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen (dir) + (strcmp(dir,"/") ? 1 : 0); data/silo-llnl-4.10.2.real/tools/browser/browser.c:542:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s = malloc (n + strlen(toc[i].name) + 1); data/silo-llnl-4.10.2.real/tools/browser/browser.c:550:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen (text); data/silo-llnl-4.10.2.real/tools/browser/browser.c:1334:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert (strlen(passwd->pw_dir)+strlen(HISTORY_FILE)+2 < data/silo-llnl-4.10.2.real/tools/browser/browser.c:1334:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert (strlen(passwd->pw_dir)+strlen(HISTORY_FILE)+2 < data/silo-llnl-4.10.2.real/tools/browser/browser.c:1354:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert (strlen(userhome) + strlen(HISTORY_FILE) +2 < data/silo-llnl-4.10.2.real/tools/browser/browser.c:1354:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert (strlen(userhome) + strlen(HISTORY_FILE) +2 < data/silo-llnl-4.10.2.real/tools/browser/file.c:77:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define CHECK_SYMBOL(A) if (!strncmp(str, #A, strlen(str))) return A data/silo-llnl-4.10.2.real/tools/browser/file.c:80:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strncmp(tmp, #A"=", strlen(#A)+1)) \ data/silo-llnl-4.10.2.real/tools/browser/file.c:92:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strncmp(tmp, #A"=", strlen(#A)+1)) \ data/silo-llnl-4.10.2.real/tools/browser/file.c:94:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). driver_strs[driver_nstrs] = safe_strdup(&tmp[strlen(#A)]+1);\ data/silo-llnl-4.10.2.real/tools/browser/file.c:101:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strncmp(tmp, #A"=", strlen(#A)+1)) \ data/silo-llnl-4.10.2.real/tools/browser/file.c:103:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). driver_ints[driver_nints] = StringToOptval(&tmp[strlen(#A)]+1);\ data/silo-llnl-4.10.2.real/tools/browser/file.c:620:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). new_names[i] = (char *)malloc(strlen(obj->comp_names[i])+strlen(suffix)+1); data/silo-llnl-4.10.2.real/tools/browser/file.c:620:70: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). new_names[i] = (char *)malloc(strlen(obj->comp_names[i])+strlen(suffix)+1); data/silo-llnl-4.10.2.real/tools/browser/file.c:802:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (*s) s[strlen(s)-1] = '\0'; data/silo-llnl-4.10.2.real/tools/browser/file.c:908:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(obj->pdb_names[i]+4, s, strlen(s))) { data/silo-llnl-4.10.2.real/tools/browser/file.c:910:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). obj->pdb_names[i] = (char *)malloc (strlen(s)+5); data/silo-llnl-4.10.2.real/tools/browser/file.c:2140:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dims[0] = strlen((char *)mem) + 1; data/silo-llnl-4.10.2.real/tools/browser/file.c:2145:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dims[0] = strlen((char *)mem) + 1; data/silo-llnl-4.10.2.real/tools/browser/file.c:2331:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(path, name, base-name); data/silo-llnl-4.10.2.real/tools/browser/file.c:2659:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (j=0; j<ndims; j++) sprintf(buf+strlen(buf), " %d", data/silo-llnl-4.10.2.real/tools/browser/file.c:2661:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(buf+strlen(buf), " (primitive %d)", datatype); data/silo-llnl-4.10.2.real/tools/browser/file.c:2909:28: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. if (strcmp(a_cwd,"/")) strcat(a_cwd, "/"); data/silo-llnl-4.10.2.real/tools/browser/file.c:2911:28: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. if (strcmp(b_cwd,"/")) strcat(b_cwd, "/"); data/silo-llnl-4.10.2.real/tools/browser/func.c:155:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). at += strlen (buf+at); data/silo-llnl-4.10.2.real/tools/browser/func.c:163:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). at += strlen (buf+at); data/silo-llnl-4.10.2.real/tools/browser/func.c:637:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(header+strlen(header), "%-*s%-*s%*s%s\n", data/silo-llnl-4.10.2.real/tools/browser/func.c:639:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (int)strlen(DIFF_SEPARATOR), "", b_name); data/silo-llnl-4.10.2.real/tools/browser/func.c:642:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(header+strlen(header), "Differences between %s and %s\n", data/silo-llnl-4.10.2.real/tools/browser/func.c:647:39: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. for (j=0; j<OUT_NCOLS-2; j++) strcat(header, "-"); data/silo-llnl-4.10.2.real/tools/browser/func.c:1469:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (selected[i]) width = MAX(width, (int)strlen(toc[i].name)); data/silo-llnl-4.10.2.real/tools/browser/lex.c:391:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). f->s = malloc(strlen(temp)+2); data/silo-llnl-4.10.2.real/tools/browser/lex.c:393:13: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(f->s, "\n"); data/silo-llnl-4.10.2.real/tools/browser/lex.c:408:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, f->s, sizeof(buf)); data/silo-llnl-4.10.2.real/tools/browser/lex.c:415:13: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getc(f->f); data/silo-llnl-4.10.2.real/tools/browser/lex.c:626:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(f->lexeme, ">"); data/silo-llnl-4.10.2.real/tools/browser/output.c:395:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen (buf); data/silo-llnl-4.10.2.real/tools/browser/output.c:600:19: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (n=read(STDIN_FILENO, &buf, 1))<0 && data/silo-llnl-4.10.2.real/tools/browser/output.c:605:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i=0; i<strlen(prompt); i++) putc('\b', f->f); data/silo-llnl-4.10.2.real/tools/browser/output.c:606:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i=0; i<strlen(prompt); i++) putc(' ', f->f); data/silo-llnl-4.10.2.real/tools/browser/output.c:607:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i=0; i<strlen(prompt); i++) putc('\b', f->f); data/silo-llnl-4.10.2.real/tools/browser/output.c:750:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). f->col += strlen (f->field[i].name); data/silo-llnl-4.10.2.real/tools/browser/output.c:777:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). f->col += strlen(buf); data/silo-llnl-4.10.2.real/tools/browser/output.c:990:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int n = strlen (s); data/silo-llnl-4.10.2.real/tools/browser/output.c:1149:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!t) t = s+strlen(s); data/silo-llnl-4.10.2.real/tools/browser/output.c:1152:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (buf, s, t-s); data/silo-llnl-4.10.2.real/tools/browser/parse.c:420:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(opname+2, first, last-first); data/silo-llnl-4.10.2.real/tools/browser/parse.c:430:17: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(opname+3, first, last-first); data/silo-llnl-4.10.2.real/tools/browser/parse.c:431:17: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(opname+(3+last-first), "\""); data/silo-llnl-4.10.2.real/tools/browser/parse.c:606:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i=strlen(s)-1; i>=0 && isspace(s[i]); --i) s[i] = '\0'; data/silo-llnl-4.10.2.real/tools/browser/parse.c:644:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (s && strlen(s)>0 && '\n'==s[strlen(s)-1]) s[strlen(s)-1] = '\0'; data/silo-llnl-4.10.2.real/tools/browser/parse.c:644:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (s && strlen(s)>0 && '\n'==s[strlen(s)-1]) s[strlen(s)-1] = '\0'; data/silo-llnl-4.10.2.real/tools/browser/parse.c:644:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (s && strlen(s)>0 && '\n'==s[strlen(s)-1]) s[strlen(s)-1] = '\0'; data/silo-llnl-4.10.2.real/tools/browser/stc.c:542:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). width = MAX (width, (int) strlen(dir->toc[i].name)); data/silo-llnl-4.10.2.real/tools/browser/stc.c:921:41: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. if (strcmp(cwd+14,"/")) strcat (cwd, "/"); data/silo-llnl-4.10.2.real/tools/browser/str.c:250:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen(s); data/silo-llnl-4.10.2.real/tools/browser/str.c:272:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). at += strlen(buf+at); data/silo-llnl-4.10.2.real/tools/browser/str.c:304:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). at += strlen(buf+at); data/silo-llnl-4.10.2.real/tools/browser/str.c:313:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). at += strlen(buf+at); data/silo-llnl-4.10.2.real/tools/browser/switch.c:167:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(fulldoc, "\n"); data/silo-llnl-4.10.2.real/tools/browser/switch.c:252:13: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(buffer, " "); data/silo-llnl-4.10.2.real/tools/browser/switch.c:253:28: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. if (!required) strcat(buffer, "["); data/silo-llnl-4.10.2.real/tools/browser/switch.c:255:28: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. if (!required) strcat(buffer, "]"); data/silo-llnl-4.10.2.real/tools/browser/switch.c:264:28: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. if (!required) strcat(buffer, "["); data/silo-llnl-4.10.2.real/tools/browser/switch.c:265:13: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(buffer, "="); data/silo-llnl-4.10.2.real/tools/browser/switch.c:267:28: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. if (!required) strcat(buffer, "]"); data/silo-llnl-4.10.2.real/tools/browser/switch.c:360:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(s); data/silo-llnl-4.10.2.real/tools/browser/switch.c:363:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(name, s, MIN(name_size, len)); data/silo-llnl-4.10.2.real/tools/browser/switch.c:370:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(name, "NUMBER", name_size); data/silo-llnl-4.10.2.real/tools/browser/switch.c:374:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(name, "INTEGER", name_size); data/silo-llnl-4.10.2.real/tools/browser/switch.c:377:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(name, "STRING", name_size); data/silo-llnl-4.10.2.real/tools/browser/switch.c:380:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(name, "BOOLEAN", name_size); data/silo-llnl-4.10.2.real/tools/browser/switch.c:598:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t namelen = eq ? eq-argv[i] : strlen(argv[i]); data/silo-llnl-4.10.2.real/tools/browser/switch.c:601:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(name, argv[i], namelen); data/silo-llnl-4.10.2.real/tools/json/jsonify_silo_example.c:130:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(json_object_get_string(mobj))) data/silo-llnl-4.10.2.real/tools/mapred/stream_silo.c:230:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). origdir_names[i] = new char[strlen(toc->dir_names[i])+1]; data/silo-llnl-4.10.2.real/tools/mapred/stream_silo.c:275:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(argv[i])<sizeof(filename)); data/silo-llnl-4.10.2.real/tools/mapred/stream_silo.c:281:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(argv[i])<sizeof(varname)); data/silo-llnl-4.10.2.real/tools/python/pydbfile.cpp:415:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dims = strlen(svar); data/silo-llnl-4.10.2.real/tools/python/pydbtoc.cpp:80:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(tmp); \ data/silo-llnl-4.10.2.real/tools/python/pydbtoc.cpp:84:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(tmp); \ data/silo-llnl-4.10.2.real/tools/python/pydbtoc.cpp:88:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(toc->nm ## _names[i]); \ data/silo-llnl-4.10.2.real/tools/python/pydbtoc.cpp:92:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(sep); \ data/silo-llnl-4.10.2.real/tools/python/pydbtoc.cpp:96:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(term); \ data/silo-llnl-4.10.2.real/tools/python/pydbtoc.cpp:126:12: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (s) strcpy(s, ""); data/silo-llnl-4.10.2.real/tools/silock/silock.c:333:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirNames[i] = (char *) malloc(strlen(toc->dir_names[i])+1); data/silo-llnl-4.10.2.real/tools/silock/silock.c:400:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(fileName, argv[i], sizeof(fileName)-1); ANALYSIS SUMMARY: Hits = 2169 Lines analyzed = 159835 in approximately 4.53 seconds (35307 lines/second) Physical Source Lines of Code (SLOC) = 92618 Hits@level = [0] 1018 [1] 416 [2] 1232 [3] 5 [4] 516 [5] 0 Hits@level+ = [0+] 3187 [1+] 2169 [2+] 1753 [3+] 521 [4+] 516 [5+] 0 Hits/KSLOC@level+ = [0+] 34.4102 [1+] 23.4188 [2+] 18.9272 [3+] 5.62526 [4+] 5.57127 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.