Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/psfile.c
Examining data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c
Examining data/swi-prolog-8.2.3+dfsg/packages/table/table.c
Examining data/swi-prolog-8.2.3+dfsg/packages/table/order.c
Examining data/swi-prolog-8.2.3+dfsg/packages/table/error.c
Examining data/swi-prolog-8.2.3+dfsg/packages/table/table.h
Examining data/swi-prolog-8.2.3+dfsg/packages/table/error.h
Examining data/swi-prolog-8.2.3+dfsg/packages/table/order.h
Examining data/swi-prolog-8.2.3+dfsg/packages/inclpr/inclpr.c
Examining data/swi-prolog-8.2.3+dfsg/packages/inclpr/inclpr_interval_arithmetic.h
Examining data/swi-prolog-8.2.3+dfsg/packages/libedit/libedit4pl.c
Examining data/swi-prolog-8.2.3+dfsg/packages/pcre/pcre4pl.c
Examining data/swi-prolog-8.2.3+dfsg/packages/zlib/zlib4pl.c
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/sgml2pl.c
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/charmap.c
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/model.h
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/utf8.h
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/sgml.c
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/dtd2pl.c
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/prolog.c
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/xmlns.h
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/catalog.c
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/utf8.c
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/util.h
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/model.c
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/error.c
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/xmlns.c
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/util.c
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/error.h
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.h
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/catalog.h
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/quote.c
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/sgmldefs.h
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/prolog.h
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/xml_unicode.c
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/dtd.h
Examining data/swi-prolog-8.2.3+dfsg/packages/sgml/xml_unicode.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/isub.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/double_metaphone.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/pl-isub.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/isub.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/double_metaphone.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/porter_stem.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/libstemmer/libstemmer_utf8.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/libstemmer/modules_utf8.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/libstemmer/modules.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/libstemmer/libstemmer.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_russian.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_romanian.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_romanian.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_porter.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_english.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_norwegian.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_spanish.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_french.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_hungarian.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_turkish.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_dutch.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_finnish.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_italian.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_french.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_swedish.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_turkish.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_russian.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_english.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_danish.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_porter.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_italian.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_swedish.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_dutch.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_german.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_hungarian.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_danish.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_portuguese.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_german.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_spanish.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_portuguese.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_norwegian.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/src_c/stem_UTF_8_finnish.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/include/libstemmer.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/runtime/utilities.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/runtime/api.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/runtime/api.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/runtime/header.h
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/examples/stemwords.c
Examining data/swi-prolog-8.2.3+dfsg/packages/nlp/snowball.c
Examining data/swi-prolog-8.2.3+dfsg/packages/readline/readline4pl.c
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/ansi_esc_seq.cpp
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/ParenMatching.cpp
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/ansi_esc_seq.h
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/SwiPrologEngine.cpp
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/swipl_win.h
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/Swipl_IO.h
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/lqUty_global.h
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/SwiPrologEngine.h
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/Swipl_IO.cpp
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/Preferences.h
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/pqTerm.h
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/pqConsole.h
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/main.cpp
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/Preferences.cpp
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/ParenMatching.h
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/pqMainWindow.h
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/do_events.h
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/pqConsole_global.h
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/ConsoleEdit.h
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/PREDICATE.h
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/pqTerm.cpp
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/Completion.cpp
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/blockSig.h
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/pqConsole.cpp
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/FlushOutputEvents.cpp
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/FlushOutputEvents.h
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/pqMainWindow.cpp
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/swipl_win.cpp
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/Completion.h
Examining data/swi-prolog-8.2.3+dfsg/packages/swipl-win/ConsoleEdit.cpp
Examining data/swi-prolog-8.2.3+dfsg/packages/yaml/yaml4pl.c
Examining data/swi-prolog-8.2.3+dfsg/packages/protobufs/protobufs.c
Examining data/swi-prolog-8.2.3+dfsg/packages/protobufs/demo/foo.cpp
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/win_error.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/prolog_stream.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/cgi.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/uid.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/rlimit.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/uuid.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/md5.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/md54pl.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/readutil.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/form.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/sockcommon.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/sha4pl.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/nonblockio.h
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/mallocinfo.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/md5passwd.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/util.h
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/unix.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/md5.h
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/error.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/nonblockio.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha1b.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/hmac_sha1.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/hmac_sha256.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/shasum.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2b.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/pwd2key.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/hmac.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha1.h
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/brg_types.h
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/hmac.h
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/brg_endian.h
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/pwd2key.h
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2.h
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha1.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/socket.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/error.h
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/syslog.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/clib.h
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/form.h
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/bsd-crypt.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/crypt.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/files.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/hash_stream.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/process.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/memfile.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/winpipe.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/streaminfo.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/time.c
Examining data/swi-prolog-8.2.3+dfsg/packages/clib/uri.c
Examining data/swi-prolog-8.2.3+dfsg/packages/PDT/pdt_console.c
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/debug.h
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/atom.c
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/unicode_map.c
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/resource.h
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/md5.c
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/buffer.h
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/atom_map.c
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/ntriples.c
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/skiplist.h
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/xsd.h
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/memory.h
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/xsd.c
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/resource.c
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/murmur.h
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/mutex.h
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/md5.h
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/error.c
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/snapshot.h
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.h
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/query.c
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/murmur.c
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/snapshot.c
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/error.h
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/debug.c
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/hash.h
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle_chars.c
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/query.h
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/hash.c
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/deferfree.h
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/atom.h
Examining data/swi-prolog-8.2.3+dfsg/packages/semweb/skiplist.c
Examining data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c
Examining data/swi-prolog-8.2.3+dfsg/packages/tipc/tipc.c
Examining data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/lib/xcnvcurs.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/xpce-stub.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/table.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/link.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/interface.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/pcecall.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msg/message.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msg/obtain.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msg/nameref.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msg/not.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msg/when.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msg/block.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msg/code.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msg/progn.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msg/while.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msg/nonequal.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msg/create.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msg/equal.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msg/and.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msg/quote.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msg/proto.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msg/function.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msg/if.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msg/or.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msg/assign.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msg/var.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msg/binding.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/test/m-model.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/stream.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/socket.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/client.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/proto.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/mswinsock.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msmetafile.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/stream.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msframe.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msuxnt.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/xcursors.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msfont.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msprinter.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mstimer.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msppm.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/simx.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswindow.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/xcolours.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/xcursor.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msjpeg.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mscursor.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mscolour.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/multimon.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/xpm.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswin.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/xpcemh.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msimage.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msproto.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msdraw.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msreadimage.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msdisplay.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/xpcemh.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mscommon.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msprocess.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/include.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msmenu.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msstream.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswin.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msevent.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regex.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regc_nfa.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/test.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regcompA.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regexecW.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/rege_dfa.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regc_color.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regtypes.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regerrs.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regc_cvec.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regexec.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regfronts.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regc_locale.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regguts.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regfree.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regerror.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regcomp.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regcustom.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regc_lex.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regcompW.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regexecA.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xcolour.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/canvasP.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/ximage.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xframe.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/x11-compat.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdraw.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xjpeg.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/fshell.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xcursor.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/wstproto.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdnd.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdisplay.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xcommon.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/canvas.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xppm.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xunix.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xevent.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/x11.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdnd.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xconvert.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xmenu.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xfont.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xstream.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/fshellP.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/canvas.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xversion.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xtimer.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xwindow.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/include.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/fshell.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/graphics.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/xos.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/layout.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/lang.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/utf8.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/text.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/kernel.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/arith.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/str.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/syntax.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/wst.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/trace.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/dialog.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/interface.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/XPCE.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/stream.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/types.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/unix.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/box/tbox.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/box/boxes.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/box/grbox.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/box/lbox.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/box/hbox.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/box/boxes.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/box/rubber.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/box/proto.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/box/parbox.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/label.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/menuitem.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/intitem.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/button.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/popup.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/menubar.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/labelbox.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/tab.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/diagroup.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/slider.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/menu.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/proto.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/textitem.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/tabstack.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/dialogitem.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/main.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/srcsink.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/host.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/iostream.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/asfile.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/rc.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/xmalloc.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/console.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/main.cxx
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/stub.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/c.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/hostdata.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/public.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/c.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/interface.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/stub.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/cpointer.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/cpp.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/cpp.cxx
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/jpegtoxpm.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/jdatasrc.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/gifread.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/gif.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/gifwrite.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/giftoxpm.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/gifwrite.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/jdatadst.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/imgutil.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/jpeg.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/fmt/tabslice.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/fmt/layoutitf.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/fmt/tabcell.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/fmt/table.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/fmt/layoutmgr.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/fmt/proto.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/fmt/paragraph.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/class.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/xref.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/getmethod.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/assoc.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/behaviour.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/passing.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/variable.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/classvar.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/type.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/object.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/sendmethod.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/name.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/error.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/programobject.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/declarations.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/timer.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/glob.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/save.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/global.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/debug.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/gc.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/proto.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/version.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/self.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/srclocation.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/method.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/alloc.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/alloc.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/trace.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/name.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/inline.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/classstub.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/md.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/format.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/device.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/elevation.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/scrollbar.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/pixmap.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/postscript.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/pen.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/visual.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/joint.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/box.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/graphstate.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/figure.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/graphical.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/font.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/node.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/bezier.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/text.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/line.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/hsv.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/draw.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/path.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/link.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/image.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/bitmap.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/arrow.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/proto.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/ellipse.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/arc.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/colour.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/cursor.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/circle.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/handle.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/listbrowser.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/colourmap.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/connection.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/tree.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/displaymgr.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/decorate.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/picture.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/view.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/setup.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/monitor.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/tile.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/tileadjust.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/proto.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/dialog.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/browser.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/display.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/application.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/rclass.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/frame.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/window.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gnu/proto.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gnu/getdate.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/constant.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/tuple.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/number.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/dictitem.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/date.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/atable.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/vector.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/attribute.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/region.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/dict.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/area.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/sheet.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/size.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/proto.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/real.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/chaintable.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/chain.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/bool.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/point.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/hashtable.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rel/constraint.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rel/hyper.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rel/identity.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rel/proto.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rel/relation.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rel/spatial.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/prg/tokeniser.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/prg/parser.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/prg/proto.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/prg/operator.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/evt/conngesture.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/evt/browserselgesture.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/evt/mvolgesture.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/evt/popupgesture.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/evt/modifier.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/evt/eventnode.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/evt/recogniser.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/evt/resizegesture.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/evt/eventtree.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/evt/gesture.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/evt/rzolgesture.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/evt/handler.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/evt/clickgesture.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/evt/handlergroup.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/evt/edittextgest.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/evt/resizetabslice.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/evt/event.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/evt/proto.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/evt/movegesture.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/find_names.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/md/md-win64.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/md/md-windows.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/md/md-win32.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ari/equation.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ari/proto.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ari/expression.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/fragment.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/textbuffer.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/utf8.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/syntax.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/textmargin.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/textcursor.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/keybinding.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/editor.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/proto.h
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/undo.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/textimage.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/i18n.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/chararray.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/string.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/regex.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/style.c
Examining data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/str.c
Examining data/swi-prolog-8.2.3+dfsg/packages/jpl/src/main/c/jpl.c
Examining data/swi-prolog-8.2.3+dfsg/packages/bdb/bdb4pl.h
Examining data/swi-prolog-8.2.3+dfsg/packages/bdb/bdb4pl.c
Examining data/swi-prolog-8.2.3+dfsg/packages/utf8proc/pgsql/utf8proc_pgsql.c
Examining data/swi-prolog-8.2.3+dfsg/packages/utf8proc/utf8proc.c
Examining data/swi-prolog-8.2.3+dfsg/packages/utf8proc/utf8proc_data.c
Examining data/swi-prolog-8.2.3+dfsg/packages/utf8proc/ruby/utf8proc_native.c
Examining data/swi-prolog-8.2.3+dfsg/packages/utf8proc/unicode4pl.c
Examining data/swi-prolog-8.2.3+dfsg/packages/utf8proc/utf8proc.h
Examining data/swi-prolog-8.2.3+dfsg/packages/windows/dlltest.c
Examining data/swi-prolog-8.2.3+dfsg/packages/windows/plregtry.c
Examining data/swi-prolog-8.2.3+dfsg/packages/ssl/cryptolib.h
Examining data/swi-prolog-8.2.3+dfsg/packages/ssl/cryptolib.c
Examining data/swi-prolog-8.2.3+dfsg/packages/ssl/util.h
Examining data/swi-prolog-8.2.3+dfsg/packages/ssl/crypto4pl.c
Examining data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c
Examining data/swi-prolog-8.2.3+dfsg/packages/archive/archive4pl.c
Examining data/swi-prolog-8.2.3+dfsg/packages/cpp/test.cpp
Examining data/swi-prolog-8.2.3+dfsg/packages/cpp/main.cpp
Examining data/swi-prolog-8.2.3+dfsg/packages/cpp/SWI-cpp.h
Examining data/swi-prolog-8.2.3+dfsg/packages/cpp/likes.cpp
Examining data/swi-prolog-8.2.3+dfsg/packages/http/websocket.c
Examining data/swi-prolog-8.2.3+dfsg/packages/http/json.c
Examining data/swi-prolog-8.2.3+dfsg/packages/http/http_stream.c
Examining data/swi-prolog-8.2.3+dfsg/packages/http/http_error.c
Examining data/swi-prolog-8.2.3+dfsg/packages/http/cgi_stream.c
Examining data/swi-prolog-8.2.3+dfsg/packages/http/multipart.c
Examining data/swi-prolog-8.2.3+dfsg/packages/http/stream_range.c
Examining data/swi-prolog-8.2.3+dfsg/packages/http/http_chunked.c
Examining data/swi-prolog-8.2.3+dfsg/packages/chr/chr_support.c
Examining data/swi-prolog-8.2.3+dfsg/cmake/TestFileOffsetBits.c
Examining data/swi-prolog-8.2.3+dfsg/cmake/TestBSDSignals.c
Examining data/swi-prolog-8.2.3+dfsg/cmake/CheckFloatingPointFormat.c
Examining data/swi-prolog-8.2.3+dfsg/cmake/TestGNUQsortR.c
Examining data/swi-prolog-8.2.3+dfsg/cmake/TestSignalType.c
Examining data/swi-prolog-8.2.3+dfsg/cmake/CheckAlignment.c
Examining data/swi-prolog-8.2.3+dfsg/cmake/TestSCNProcessors.c
Examining data/swi-prolog-8.2.3+dfsg/cmake/TestWindowsFSeek.c
Examining data/swi-prolog-8.2.3+dfsg/man/calc.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-funct.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-ldpass.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-zip.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-attvar.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-nt.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-event.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-prims.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-debug.c
Examining data/swi-prolog-8.2.3+dfsg/src/mkvmi.c
Examining data/swi-prolog-8.2.3+dfsg/src/test/recmutex.c
Examining data/swi-prolog-8.2.3+dfsg/src/test/lwrcase.c
Examining data/swi-prolog-8.2.3+dfsg/src/test/nop.c
Examining data/swi-prolog-8.2.3+dfsg/src/test/dmalloc.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-index.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-trie.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-rsort.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-util.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-gc.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-copyterm.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-thread.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-allocpool.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-incl.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-prof.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-alloc.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-segstack.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-wrap.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-dbref.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-codelist.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-event.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-op.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-setup.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/taia_now.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/taia_approx.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/caltime_tai.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/caldate_fmjd.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/leapsecs_init.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/caltime_utc.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/taia_add.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/tai_now.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/caldate_fmt.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/caldate_scan.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/check.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/tai_add.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/caldate_norm.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/taia_unpack.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/leapsecs_sub.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/tai_pack.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/taia_less.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/leapsecs_read.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/nowutc.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/caltime_scan.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/taia_tai.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/tai_sub.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/leapsecs.h
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/caltime.h
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/caldate.h
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/taia_pack.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/leapsecs.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/taia_sub.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/easter.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/caldate_ster.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/caltime_fmt.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/leapsecs_add.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/caldate_mjd.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/tai.h
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/yearcal.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/taia_half.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/taia.h
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/tai_unpack.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/taia_frac.c
Examining data/swi-prolog-8.2.3+dfsg/src/libtai/taia_fmtfrac.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-zip.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-debug.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-main.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-term.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-flag.c
Examining data/swi-prolog-8.2.3+dfsg/src/win32/console/menu.h
Examining data/swi-prolog-8.2.3+dfsg/src/win32/console/console_i.h
Examining data/swi-prolog-8.2.3+dfsg/src/win32/console/edit.c
Examining data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c
Examining data/swi-prolog-8.2.3+dfsg/src/win32/console/console.h
Examining data/swi-prolog-8.2.3+dfsg/src/win32/console/menu.c
Examining data/swi-prolog-8.2.3+dfsg/src/win32/console/complete.c
Examining data/swi-prolog-8.2.3+dfsg/src/win32/console/registry.c
Examining data/swi-prolog-8.2.3+dfsg/src/win32/console/common.h
Examining data/swi-prolog-8.2.3+dfsg/src/win32/console/history.h
Examining data/swi-prolog-8.2.3+dfsg/src/win32/console/history.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-rsort.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-dde.c
Examining data/swi-prolog-8.2.3+dfsg/src/compat/YapInterface.h
Examining data/swi-prolog-8.2.3+dfsg/src/compat/yap.c
Examining data/swi-prolog-8.2.3+dfsg/src/compat/sicstus.h
Examining data/swi-prolog-8.2.3+dfsg/src/minizip/zip.h
Examining data/swi-prolog-8.2.3+dfsg/src/minizip/unzip.c
Examining data/swi-prolog-8.2.3+dfsg/src/minizip/unzip.h
Examining data/swi-prolog-8.2.3+dfsg/src/minizip/minizip.c
Examining data/swi-prolog-8.2.3+dfsg/src/minizip/iowin32.h
Examining data/swi-prolog-8.2.3+dfsg/src/minizip/mztools.h
Examining data/swi-prolog-8.2.3+dfsg/src/minizip/iowin32.c
Examining data/swi-prolog-8.2.3+dfsg/src/minizip/ioapi.c
Examining data/swi-prolog-8.2.3+dfsg/src/minizip/ioapi.h
Examining data/swi-prolog-8.2.3+dfsg/src/minizip/miniunz.c
Examining data/swi-prolog-8.2.3+dfsg/src/minizip/zip.c
Examining data/swi-prolog-8.2.3+dfsg/src/minizip/crypt.h
Examining data/swi-prolog-8.2.3+dfsg/src/minizip/mztools.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-ext.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-string.h
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-files.h
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-os.h
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-file.h
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-utf8.h
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-locale.h
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-tai.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-dtoa.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-table.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-text.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-buffer.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-option.h
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-prologflag.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/dtoa.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-dtoa.h
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-locale.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-ctype.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-text.h
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-cstack.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-table.h
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-string.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-ctype.h
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-option.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/windows/dwarf-debug.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/windows/utf8.h
Examining data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/windows/utf8.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/windows/popen.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.h
Examining data/swi-prolog-8.2.3+dfsg/src/os/windows/dirent.h
Examining data/swi-prolog-8.2.3+dfsg/src/os/SWI-Stream.h
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-buffer.h
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-cstack.h
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-utf8.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-codelist.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c
Examining data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-init.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-xterm.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-arith.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-prof.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-alloc.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-error.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-builtin.h
Examining data/swi-prolog-8.2.3+dfsg/src/SWI-Prolog.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-trace.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-funcs.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-mutex.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-variant.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-termhash.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-vmi.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-dict.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-init.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-list.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-atom.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-inline.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-modul.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-bag.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-comp.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-pro.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-umap.c
Examining data/swi-prolog-8.2.3+dfsg/src/pentium.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-data.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-wam.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-dict.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-gvar.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-sys.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-btree.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-wrap.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-privitf.h
Examining data/swi-prolog-8.2.3+dfsg/src/config/win32.h
Examining data/swi-prolog-8.2.3+dfsg/src/config/win64.h
Examining data/swi-prolog-8.2.3+dfsg/src/config/wincfg.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-hash.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-codetable.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-global.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-wic.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-ressymbol.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-tabling.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-dbref.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-tabling.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-cont.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-thread.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-mutex.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-write.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-ntconsole.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-string.c
Examining data/swi-prolog-8.2.3+dfsg/src/defatom.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-supervisor.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-privitf.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-fli.c
Examining data/swi-prolog-8.2.3+dfsg/src/Tests/foreign/hello.c
Examining data/swi-prolog-8.2.3+dfsg/src/Tests/xsb/ai_tests/can_mono.H
Examining data/swi-prolog-8.2.3+dfsg/src/pl-proc.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-indirect.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-copyterm.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-ntmain.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-allocpool.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-termwalk.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-segstack.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-comp.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-read.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-trie.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-srcfile.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-gmp.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-load.c
Examining data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-gmp.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-rec.c
Examining data/swi-prolog-8.2.3+dfsg/src/pentium.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-version.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-beos.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-dwim.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-hash.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-error.c
Examining data/swi-prolog-8.2.3+dfsg/src/pl-arith.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-indirect.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-ressymbol.h
Examining data/swi-prolog-8.2.3+dfsg/src/pl-assert.c

FINAL RESULTS:

data/swi-prolog-8.2.3+dfsg/packages/clib/files.c:274:8:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  if ( chmod(name, imode) != 0 )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/stream.h:352:9:  [5] (buffer) gets:
  Does not check for buffer overflows (CWE-120, CWE-20). Use fgets() instead.
#define gets		Sgets
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/xos.h:58:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
#define chmod(path, mode)	_xos_chmod(path, mode)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c:970:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
      { chmod(line, 0622);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c:997:2:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
	chmod(line, 0622);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c:1030:3:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  chmod(slave, 0622);
data/swi-prolog-8.2.3+dfsg/src/os/SWI-Stream.h:349:9:  [5] (buffer) gets:
  Does not check for buffer overflows (CWE-120, CWE-20). Use fgets() instead.
#define gets		Sgets
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:269:11:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
  if ( (n=readlink(f, buf, MAXPATHLEN-1)) > 0 )
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:450:8:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
  if ( chmod(name, buf.st_mode) == -1 )
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.h:70:8:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
#undef chmod
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.h:87:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
#define chmod _xos_chmod
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1631:12:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
      if ( chmod(out, 0777 & ~mask) != 0 )
data/swi-prolog-8.2.3+dfsg/man/calc.c:20:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(e, argv[n]);
data/swi-prolog-8.2.3+dfsg/packages/bdb/bdb4pl.c:1662:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(config[nconf], n);
data/swi-prolog-8.2.3+dfsg/packages/bdb/bdb4pl.c:1664:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	  strcat(config[nconf], v);
data/swi-prolog-8.2.3+dfsg/packages/clib/bsd-crypt.c:494:1:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
crypt(const char *key, const char *setting)
data/swi-prolog-8.2.3+dfsg/packages/clib/bsd-crypt.c:1002:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
{ fprintf(stderr, fmt, s);
data/swi-prolog-8.2.3+dfsg/packages/clib/bsd-crypt.c:1015:20:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
    printf("%s\n", crypt(argv[1], (argc > 2) ? argv[2] : argv[1]));
data/swi-prolog-8.2.3+dfsg/packages/clib/crypt.c:47:14:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
extern char *crypt(const char *key, const char *setting);
data/swi-prolog-8.2.3+dfsg/packages/clib/crypt.c:109:22:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
      rval = ( (s2 = crypt(pw, salt)) &&
data/swi-prolog-8.2.3+dfsg/packages/clib/crypt.c:159:12:  [4] (crypto) crypt:
  The crypt functions use a poor one-way hashing algorithm; since they only
  accept passwords of 8 characters or fewer and only a two-byte salt, they
  are excessively vulnerable to dictionary attacks given today's faster
  computing equipment (CWE-327). Use a different algorithm, such as SHA-256,
  with a larger, non-repeating salt.
    { s2 = crypt(pw, salt);
data/swi-prolog-8.2.3+dfsg/packages/clib/md5passwd.c:121:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(passwd,magic);
data/swi-prolog-8.2.3+dfsg/packages/clib/nonblockio.c:244:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(dest, src);
data/swi-prolog-8.2.3+dfsg/packages/clib/process.c:520:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(info->argv[0], info->exe);
data/swi-prolog-8.2.3+dfsg/packages/clib/process.c:1103:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
open_null_stream(DWORD access)
data/swi-prolog-8.2.3+dfsg/packages/clib/process.c:1111:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		    access,
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/pwd2key.c:183:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(j < key_len ? " ... \n" : "\n");
data/swi-prolog-8.2.3+dfsg/packages/clib/unix.c:137:5:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    execvp(argv[0], argv);
data/swi-prolog-8.2.3+dfsg/packages/jpl/src/main/c/jpl.c:395:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(v, "%d.%d.%d-%s", JPL_C_LIB_VERSION_MAJOR, JPL_C_LIB_VERSION_MINOR,
data/swi-prolog-8.2.3+dfsg/packages/jpl/src/main/c/jpl.c:1849:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(cpoptp, classpath);            /* oughta check length... */
data/swi-prolog-8.2.3+dfsg/packages/jpl/src/main/c/jpl.c:3112:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(argv[i], cp);
data/swi-prolog-8.2.3+dfsg/packages/jpl/src/main/c/jpl.c:4868:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(jvm_dia[i], s);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:487:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cp, s);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1034:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(g.arguments[n], abuf);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1040:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(g.arguments[n], abuf);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1044:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(g.arguments[n], abuf);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1071:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(end, "\\end{%s}", e->environment->name);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1148:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(e.arguments[n], abuf);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1154:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(e.arguments[n], abuf);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1482:3:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
  vsprintf(buf, fmt, args);
data/swi-prolog-8.2.3+dfsg/packages/nlp/double_metaphone.c:76:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(s->str, init_str);
data/swi-prolog-8.2.3+dfsg/packages/nlp/double_metaphone.c:225:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(s->str, new_str);
data/swi-prolog-8.2.3+dfsg/packages/nlp/pl-isub.c:53:13:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    { *sb = wcscpy(buf, s);
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:4633:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(oenv, otz);
data/swi-prolog-8.2.3+dfsg/packages/readline/readline4pl.c:562:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(copy, s);
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:59:9:  [4] (buffer) swprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define swprintf _snwprintf
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:114:12:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    return wcscpy(copy, in);
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:897:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
  { wcscpy(r->v.r.fast, iri);
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:1069:7:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
      wcscpy(name, prefix_iri);
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:1070:7:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
      wcscpy(name+plen, local);
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:1124:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    wcscpy(name+plen, uri);
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:1425:4:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
	  wcscpy(ts->bnode.buffer, ts->bnode.prefix);
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:1428:2:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
	swprintf(ts->bnode.prefix_end, 64, L"%ld", (long)r->v.bnode_id);
data/swi-prolog-8.2.3+dfsg/packages/sgml/catalog.c:46:9:  [4] (buffer) swprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define swprintf _snwprintf
data/swi-prolog-8.2.3+dfsg/packages/sgml/catalog.c:674:14:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
      (void) swprintf(penname, penlen, L"%ls.dtd", name);
data/swi-prolog-8.2.3+dfsg/packages/sgml/catalog.c:678:14:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
      (void) swprintf(penname, penlen, L"%ls.pen", name + 1);
data/swi-prolog-8.2.3+dfsg/packages/sgml/catalog.c:681:14:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
      (void) swprintf(penname, penlen, L"%ls.ent", name);
data/swi-prolog-8.2.3+dfsg/packages/sgml/dtd.h:340:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  ichar *system;			/* file with info */
data/swi-prolog-8.2.3+dfsg/packages/sgml/error.c:158:7:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
      vsprintf(msgbuf, fmt, args);
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:62:9:  [4] (buffer) swprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define swprintf _snwprintf
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:1593:43:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if ( (s=itake_dubbed_string(dtd, decl, &system)) )
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:1601:17:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  not->system = system;
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:1617:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    sgml_free(n->system);
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:2732:5:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
    swprintf(buf, MAXNMLEN+49, L"Incomplete element: <%s>",
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5500:7:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
    { swprintf(s, e-s, L" (from ");
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5508:2:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
	swprintf(s, e-s, L"%ls:%d:%d", l->name.file, l->line, l->linepos);
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5511:9:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
        swprintf(s, e-s, L"&%ls;%d:%d", l->name.entity, l->line, l->linepos);
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5555:7:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
      swprintf(s, end-s, L"Cannot represent due to %ls", e->argv[0]);
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5558:7:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
      swprintf(s, end-s, L"Insufficient %ls resources", e->argv[0]);
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5561:7:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
      swprintf(s, end-s, L"%ls limit exceeded", e->argv[0]);
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5564:7:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
      swprintf(s, end-s, L"SYSTEM entity %ls not allowed.  "
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5568:7:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
      swprintf(s, end-s, L"%ls", e->argv[0]);
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5571:7:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
      swprintf(s, end-s, L"%ls", e->argv[0]);
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5574:7:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
      swprintf(s, end-s, L"%ls \"%ls\" does not exist", e->argv[0], e->argv[1]);
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5577:7:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
      swprintf(s, end-s, L"Redefined %ls \"%ls\"", e->argv[0], e->argv[1]);
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5631:9:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
      { swprintf(buf, MAX_MESSAGE_LEN, L"%ls, found \"%ls\"", m, str_summary(s, 25));
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5644:7:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
      swprintf(buf, MAX_MESSAGE_LEN, L"Expected type %ls, found \"%ls\"", expected, found);
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5672:7:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
      swprintf(buf, MAX_MESSAGE_LEN, L"Inserted omitted end-tag for \"%ls\"", element);
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5681:7:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
      swprintf(buf, MAX_MESSAGE_LEN, L"Inserted omitted start-tag for \"%ls\"", element);
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5690:7:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
      swprintf(buf, MAX_MESSAGE_LEN, L"Ignored end-tag for \"%ls\" which is not open",
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5700:7:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
      swprintf(buf, MAX_MESSAGE_LEN, L"Element \"%ls\" not allowed here", element);
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5709:7:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
      swprintf(buf, MAX_MESSAGE_LEN, L"#PCDATA (\"%ls\") not allowed here",
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5720:7:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
      swprintf(buf, MAX_MESSAGE_LEN, L"Element \"%ls\" has no attribute \"%ls\"",
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5732:7:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
      swprintf(buf, MAX_MESSAGE_LEN, L"Element \"%ls\" has no attribute with value \"%ls\"",
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5752:7:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
      swprintf(buf, MAX_MESSAGE_LEN, L"No <!DOCTYPE ...>, assuming \"%ls\" from DTD file \"%s\"",
data/swi-prolog-8.2.3+dfsg/packages/sgml/sgml2pl.c:2698:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	if ( n->system )
data/swi-prolog-8.2.3+dfsg/packages/sgml/sgml2pl.c:2702:25:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			        PL_CHARS, n->system) )
data/swi-prolog-8.2.3+dfsg/packages/sgml/util.c:540:3:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
  wcscpy(copy, in);
data/swi-prolog-8.2.3+dfsg/packages/sgml/util.c:585:3:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
  wcscpy(&buf[len], &s[l-5]);
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:165:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(buf, in);
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:684:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf, "%s%04d-%02d-%02d", sign, v[0],v[1],v[2]);
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:699:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf, "%s%04d-%02d-%02dT%02d:%02d:%s",
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:717:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf, "%s%04d-%02d-%02dT%02d:%02d:%s",
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:733:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf, "%02d:%02d:%s",
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:754:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf, "%s%04d-%02d", sign, v[0], v[1]);
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:776:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(buf, "%s%04d", sign, v);
data/swi-prolog-8.2.3+dfsg/packages/ssl/cryptolib.c:95:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(new, s);
data/swi-prolog-8.2.3+dfsg/packages/ssl/cryptolib.h:63:25:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define Svfprintf       vfprintf
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:2297:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(buf, passwd);
data/swi-prolog-8.2.3+dfsg/packages/swipl-win/SwiPrologEngine.cpp:80:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(this->argv[a] = new char[strlen(argv[a]) + 1], argv[a]);
data/swi-prolog-8.2.3+dfsg/packages/table/error.c:79:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  return strcpy((char *)malloc(strlen(msg)+1), msg);
data/swi-prolog-8.2.3+dfsg/packages/table/error.c:103:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf, "%s: instantiation error on argument %d", pred, argi);
data/swi-prolog-8.2.3+dfsg/packages/table/error.c:111:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf, "%s: IO error %s", pred, msg);
data/swi-prolog-8.2.3+dfsg/packages/table/error.c:114:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf, "%s: IO error %s", pred, strerror(argi));
data/swi-prolog-8.2.3+dfsg/packages/table/table.c:289:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(buf, "%s: bad record, field %d (%s), char-index %ld",
data/swi-prolog-8.2.3+dfsg/packages/table/table.c:1986:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      strcpy(qf->value.s, tmp);
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:72:48:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define cprintf(fmt, arg...)	do { if (verbose) printf(fmt, ##arg); } while (0)
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:74:33:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define fatal(fmt, arg...)	do { printf(fmt, ##arg); exit(EXIT_FAILURE); } while (0)
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:79:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf(fmt, ##arg); \
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:146:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(addr_area, " for node %s", addr2str(dest));
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:537:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			printf((code < max_code)
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:1115:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(req_tlv.name, linkName);
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:1750:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
				strcpy(commands[cno].args, optarg);
data/swi-prolog-8.2.3+dfsg/packages/windows/plregtry.c:328:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
get_access(term_t access, REGSAM *mode)
data/swi-prolog-8.2.3+dfsg/packages/windows/plregtry.c:331:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if ( PL_get_atom(access, &a) )
data/swi-prolog-8.2.3+dfsg/packages/windows/plregtry.c:334:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  { term_t tail = PL_copy_term_ref(access);
data/swi-prolog-8.2.3+dfsg/packages/windows/plregtry.c:353:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
pl_reg_open_key(term_t parent, term_t name, term_t access, term_t handle)
data/swi-prolog-8.2.3+dfsg/packages/windows/plregtry.c:362:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
       !get_access(access, &mode) )
data/swi-prolog-8.2.3+dfsg/packages/windows/plregtry.c:656:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		  term_t class, term_t options, term_t access,
data/swi-prolog-8.2.3+dfsg/packages/windows/plregtry.c:671:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
       !get_access(access, &mode) )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/date.c:429:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(date, tzname[0]);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/date.c:708:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(oenv, otz);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/number.c:116:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(buf, INTPTR_FORMAT, n->value);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/point.c:71:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(buf, INTPTR_FORMAT "," INTPTR_FORMAT, valInt(p->x), valInt(p->y));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/size.c:65:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(buf, INTPTR_FORMAT "x" INTPTR_FORMAT, valInt(s->w), valInt(s->h));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gnu/getdate.c:1321:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(msg, count == 0 ? ", expecting `" : " or `");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gnu/getdate.c:1322:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(msg, yytname[x]);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/image.c:76:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    assign(image, access, NAME_both);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/image.c:83:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    assign(image, access, NAME_read);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/image.c:359:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
{ if ( image->access != NAME_both )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/image.c:926:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  assign(image, access, NAME_read);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/image.c:951:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    assign(image, access, NAME_read);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/pixmap.c:74:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    assign(pm, access,	   NAME_read);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/postscript.c:176:14:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	  case 'd':	sprintf(tmp, INTPTR_FORMAT, valInt(va_arg(args, Int)));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/postscript.c:192:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(tmp, INTPTR_FORMAT " " INTPTR_FORMAT " moveto",
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/postscript.c:199:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(tmp, INTPTR_FORMAT " " INTPTR_FORMAT,
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/postscript.c:205:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(tmp, INTPTR_FORMAT " " INTPTR_FORMAT " translate",
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/postscript.c:211:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(tmp, INTPTR_FORMAT, valInt(gr->pen));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/postscript.c:265:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(tmp, INTPTR_FORMAT, valInt(gr->area->x));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/postscript.c:271:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(tmp, INTPTR_FORMAT, valInt(gr->area->y));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/postscript.c:277:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(tmp, INTPTR_FORMAT, valInt(gr->area->w));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/postscript.c:283:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(tmp, INTPTR_FORMAT, valInt(gr->area->h));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/graphics.h:711:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Name		access;			/* {read,both} */ \
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/kernel.h:101:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#undef printf
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/kernel.h:758:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Name		access;			/* whether send/get may be used */ \
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/kernel.h:1207:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  Name		system;			/* host system we are connected to */ \
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/stream.h:355:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define	fprintf		Sfprintf
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/stream.h:356:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define	printf		Sprintf
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/stream.h:357:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define	vprintf		Svprintf
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/stream.h:358:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define	vfprintf	Svfprintf
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/stream.h:359:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define	sprintf		Ssprintf
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/stream.h:360:9:  [4] (buffer) vsprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define	vsprintf	Svsprintf
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/stream.h:364:9:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
#define popen		Sopen_pipe
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/xos.h:53:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#define access(path, mode)	_xos_access(path, mode)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/xos.h:66:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
int		_xos_open(const char *path, int access, ...);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/gifread.c:115:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(GIFErrorText, fmt);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/c.c:543:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    XPCE_Object type, XPCE_Object access, XPCE_Object initial)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/c.c:555:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  var = newObject(ClassObjOfVariable, name, type, access, summary, group, EAV);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/c.h:169:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				       XPCE_Object access,
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/console.c:117:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(console_out, fmt, args);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/host.c:42:13:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
{ assign(h, system, which);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/hostdata.c:131:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(tmp, "@" INTPTR_FORMAT "/%s",
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/interface.c:225:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(tmp, "@" INTPTR_FORMAT, valInt(ref));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/interface.c:235:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(tmp, "@%s", strName(ref));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/alloc.c:414:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(t, s);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/class.c:1292:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, s);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/class.c:1314:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	   char *type, Name access, char *doc)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/class.c:1322:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  v = createVariable(name, t, access);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/class.c:1335:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		   char *type, Name access, char *doc)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/class.c:1343:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  v = createVariable(name, t, access);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/classstub.c:62:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(tmp, "%s_class", strName(cstub->name));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/classstub.c:155:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(buf, "C.%s", strName(cstub->name));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/classvar.c:480:3:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
  wcscpy(o, nameToWC(ctx, &len)); o += len;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/classvar.c:482:3:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
  wcscpy(o, nameToWC(cv->name, &len)); o += len;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/classvar.c:543:3:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
  wcscpy(o, nameToWC(ctx, &len)); o += len;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/classvar.c:545:3:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
  wcscpy(o, nameToWC(cv->name, &len)); o += len;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:52:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  { sprintf(tmp, INTPTR_FORMAT, valInt(obj));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:60:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  { sprintf(tmp, INTPTR_FORMAT, ((Number)obj)->value);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:193:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(q, s);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:242:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  { sprintf(tmp, INTPTR_FORMAT, valInt(obj));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:256:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      { strcpy(&summary[1], charArrayToUTF8(ca));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:272:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    { sprintf(summary, INTPTR_FORMAT, ((Number)obj)->value);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:287:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(tmp, "@%s/%s", nameToUTF8(name), s);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:289:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(tmp, "@" INTPTR_FORMAT "/%s", valInt(PointerToInt(obj)), s);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:543:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf ms_snprintf
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:666:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		rc = snprintf(buf, sizeof(buf), fmtbuf, a);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:668:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		rc = snprintf(buf, sizeof(buf), fmtbuf, arg, a);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:679:12:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		    rc = snprintf(b2, size, fmtbuf, a);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:681:12:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		    rc = snprintf(b2, size, fmtbuf, arg, a);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:723:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		rc = snprintf(buf, sizeof(buf), fmtbuf, a);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:725:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		rc = snprintf(buf, sizeof(buf), fmtbuf, arg, a);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:736:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		    snprintf(b2, size, fmtbuf, a);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:738:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		    snprintf(b2, size, fmtbuf, arg, a);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:883:12:  [4] (buffer) vsscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
extern int vsscanf(const char *, const char *, va_list);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:1005:8:  [4] (buffer) vsscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  ar = vsscanf(str, fmt, (va_list) ptrs);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:1008:18:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  { case 0:	ar = sscanf(str, fmt); break;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:1009:18:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    case 1:	ar = sscanf(str, fmt, ptrs[0]); break;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:1010:18:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    case 2:	ar = sscanf(str, fmt, ptrs[0], ptrs[1]); break;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:1011:18:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    case 3:	ar = sscanf(str, fmt, ptrs[0], ptrs[1], ptrs[2]);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:1013:18:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    case 4:	ar = sscanf(str, fmt, ptrs[0], ptrs[1], ptrs[2],
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:1015:18:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    case 5:	ar = sscanf(str, fmt, ptrs[0], ptrs[1], ptrs[2],
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:1017:18:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    case 6:	ar = sscanf(str, fmt, ptrs[0], ptrs[1], ptrs[2],
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:1020:18:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    case 7:	ar = sscanf(str, fmt, ptrs[0], ptrs[1], ptrs[2],
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:1023:18:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    case 8:	ar = sscanf(str, fmt, ptrs[0], ptrs[1], ptrs[2],
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:1026:18:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    case 9:	ar = sscanf(str, fmt, ptrs[0], ptrs[1], ptrs[2],
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:1030:19:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    case 10:	ar = sscanf(str, fmt, ptrs[0], ptrs[1], ptrs[2],
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:1035:19:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    case 11:	ar = sscanf(str, fmt, ptrs[0], ptrs[1], ptrs[2],
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:1040:19:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    case 12:	ar = sscanf(str, fmt, ptrs[0], ptrs[1], ptrs[2],
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:1045:19:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    case 13:	ar = sscanf(str, fmt, ptrs[0], ptrs[1], ptrs[2],
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:1051:19:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    case 14:	ar = sscanf(str, fmt, ptrs[0], ptrs[1], ptrs[2],
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:1057:19:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    case 15:	ar = sscanf(str, fmt, ptrs[0], ptrs[1], ptrs[2],
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:1063:19:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    case 16:	ar = sscanf(str, fmt, ptrs[0], ptrs[1], ptrs[2],
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:1070:19:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    case 17:	ar = sscanf(str, fmt, ptrs[0], ptrs[1], ptrs[2],
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:1077:19:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    case 18:	ar = sscanf(str, fmt, ptrs[0], ptrs[1], ptrs[2],
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:1084:19:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    case 19:	ar = sscanf(str, fmt, ptrs[0], ptrs[1], ptrs[2],
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:1092:19:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    case 20:	ar = sscanf(str, fmt, ptrs[0], ptrs[1], ptrs[2],
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/method.c:321:3:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
  wcscpy(o, nameToWC(ctx, &len));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/method.c:326:3:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
  wcscpy(o, nameToWC(m->name, &len));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/method.c:433:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(buf, "%s %s%s",
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/object.c:2644:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buf, "O.%s", strName(name));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/proto.h:68:78:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
COMMON(void)	localClass(Class class, Name name, Name group, char *type, Name access, char *doc);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/proto.h:367:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
COMMON(Variable) createVariable(Name name, Type type, Name access);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/self.c:759:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(tmp, ctime(&clock));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/self.c:796:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, s);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/srclocation.c:114:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buf, "%s/src/%s", strName(home), name);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/type.c:1154:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
  { wcscpy(s->text, t->s_textW);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/variable.c:40:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
				   Name access, StringObj doc, Name group,
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/variable.c:45:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
createVariable(Name name, Type type, Name access)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/variable.c:60:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  TRY(initialiseVariable(var, name, type, access, DEFAULT, DEFAULT, DEFAULT));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/variable.c:68:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
initialiseVariable(Variable var, Name name, Type type, Name access,
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/variable.c:73:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if ( isDefault(access) ) access = NAME_both;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/variable.c:77:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  assign(var, access,  access);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/variable.c:77:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  assign(var, access,  access);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/variable.c:402:3:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
  wcscpy(o, nameToWC(ctx, &len));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/variable.c:405:3:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
  wcscpy(o, nameToWC(v->name, &len));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/variable.c:472:3:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
  wcscpy(o, nameToWC(ctx, &len)); o += len;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/variable.c:474:3:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
  wcscpy(o, nameToWC(getAccessArrowVariable(var), &len)); o += len;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/variable.c:475:3:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
  wcscpy(o, nameToWC(var->name, &len)); o += len;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/dialogitem.c:549:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf, "%s%c", strName(prefix), acc);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/intitem.c:92:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(s1, INTPTR_FORMAT, PCE_MIN_INT);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/intitem.c:93:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(s2, INTPTR_FORMAT, PCE_MAX_INT);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/intitem.c:95:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    { sprintf(s1, INTPTR_FORMAT, PCE_MIN_INT);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/intitem.c:96:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(s2, INTPTR_FORMAT, valInt(high));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/intitem.c:97:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(buf, ".." INTPTR_FORMAT, valInt(high));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/intitem.c:101:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    { sprintf(s1, INTPTR_FORMAT, valInt(low));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/intitem.c:102:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(s2, INTPTR_FORMAT, PCE_MAX_INT);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/intitem.c:103:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(buf, INTPTR_FORMAT "..", valInt(low));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/intitem.c:105:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    { sprintf(s1, INTPTR_FORMAT, valInt(low));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/intitem.c:106:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(s2, INTPTR_FORMAT, valInt(high));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/intitem.c:107:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(buf, INTPTR_FORMAT ".." INTPTR_FORMAT,
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/slider.c:88:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, deffmt ? INTPTR_FORMAT : strName(s->format), valInt(val));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/slider.c:90:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, deffmt ? "%g"  : strName(s->format), valReal(val));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/slider.c:254:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(buf, INTPTR_FORMAT, valInt(s->high));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msfont.c:253:8:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if ( sscanf(strName(f->x_name), STOCKFMT, &stock) == 1 )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msfont.c:277:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    { strcpy(lfont.lfFaceName, strName(f->family));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msfont.c:377:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, STOCKFMT, sf->id);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msimage.c:2058:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      assign(image, access, NAME_read);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msimage.c:2098:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      assign(image, access, NAME_read);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msmetafile.c:503:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    wcscpy(descr, summary);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msmetafile.c:506:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    wcscpy(s, app);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msprinter.c:218:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy((char *)&names[1], s);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msprinter.c:343:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(fname, &((char *)names)[names->wOutputOffset]);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msprocess.c:150:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		 strcat(cmdline, toCharp(a));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msreadimage.c:174:10:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
  { if ( sscanf(line,"#define %s %d",name_and_type,&value) == 2)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msreadimage.c:197:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    if (sscanf(line, "static short %s = {", name_and_type) == 1)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msreadimage.c:199:14:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    else if (sscanf(line,"static unsigned char %s = {",name_and_type) == 1)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msreadimage.c:201:14:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    else if (sscanf(line, "static char %s = {", name_and_type) == 1)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswin.c:374:4:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
	  _tcscpy(s, q); \
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswin.c:507:5:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    _tcscpy(buffer, fn);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswin.c:569:2:  [4] (buffer) _tcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	_tcscat(buffer, ext);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/multimon.h:272:17:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
                lstrcpy(((MONITORINFOEX*)lpMonitorInfo)->szDevice,
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/prg/tokeniser.c:51:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  int		access;			/* access-functions */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/prg/tokeniser.c:130:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
{ switch(t->access)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/prg/tokeniser.c:146:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch(t->access)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/prg/tokeniser.c:179:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch(t->access)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/prg/tokeniser.c:207:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  { switch(t->access)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regerror.c:95:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			sprintf(convbuf, unk, errcode);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regerror.c:104:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(errbuf, msg);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regguts.h:132:53:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define	FDEBUG(arglist)	{ if (v->eflags&REG_FTRACE) printf arglist; }
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regguts.h:134:53:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define	MDEBUG(arglist)	{ if (v->eflags&REG_MTRACE) printf arglist; }
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:392:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(&buf[dfnl], fn);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:426:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if ( access(nameToFN(d->path), m) == 0 )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:684:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, base);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:779:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(s, file);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:784:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(path, file);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:889:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    wcscpy(expanded, value);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:918:6:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
	    wcscpy(expanded, value);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:94:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    { strcpy(namebuf, s);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:281:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  { if ( access(fn, F_OK) == 0 )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:382:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
open_file(FileObj f, int access, ...)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:387:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  va_start(args, access);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:391:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  fd = open(charArrayToFN((CharArray)f->name), access, mode);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:395:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	     (access & O_RDONLY) ? NAME_read : NAME_write,
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:448:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  { sprintf(bak, "%s%s", old, ext);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:532:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if ( access(strName(name), m) == 0 )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:557:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(path, "%s%s", strName(f->name), strName(extension));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:666:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(cmd, "%s %s \"%s\"", fn, rn, pn);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:1198:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access(ufn, m);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:1228:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if ( notDefault(f->path) && access(nameToFN(f->path), m) == 0 )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:1233:3:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
  wcscpy(basebuf, base);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:1253:7:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    { wcscpy(name, pathstr);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:1271:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    wcscpy(&name[l+1], base);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c:631:7:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	if ( execvp(strName(p->name), argv) )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c:692:7:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	if ( execvp(strName(p->name), argv) )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c:1020:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(slave, line);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/display.c:1558:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    { sprintf(s, "font(%s, %s, %d, \"%s\")",
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/display.c:1564:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    { sprintf(s, "font(%s, %s, %d)",
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/frame.c:800:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buf+strlen(buf),
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/frame.c:807:2:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
	sprintf(buf+strlen(buf), "@" INTPTR_FORMAT, valInt(n)-1);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/x11.c:76:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buf, "\033]2;%s\007", strName(label));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xconvert.c:307:10:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
  { if ( sscanf(line,"#define %s %d",name_and_type,&value) == 2)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xconvert.c:328:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    if (sscanf(line, "static short %s = {", name_and_type) == 1)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xconvert.c:330:14:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    else if (sscanf(line,"static unsigned char %s = {",name_and_type) == 1)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xconvert.c:332:14:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    else if (sscanf(line, "static char %s = {", name_and_type) == 1)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdisplay.c:234:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(problem, "malformed address: %s", theaddress);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdisplay.c:702:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buf, "Bad type: %s", DisplayAtomToString(d, *type));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdnd.c:88:24:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define dnd_warning(a) fprintf (stderr, a)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdnd.c:405:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy (s + l, t[n]);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xunix.c:58:16:  [4] (misc) getlogin:
  It's often easy to fool getlogin. Sometimes it does not work at all,
  because some program messed up the utmp file. Often, it gives only the
  first 8 characters of the login name. The user currently logged in on the
  controlling tty of our program need not be the user who started it. Avoid
  getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid())
  and extract the desired information instead.
  if ( (name = getlogin()) )
data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/interface.c:2886:3:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
  vsprintf(buf, fmt, args);
data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/xpce-stub.c:65:3:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
  vsprintf(buf, msg, args);
data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/xpce-stub.c:381:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      { strcpy(ok, data.cFileName);
data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/xpce-stub.c:394:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(file, buf);
data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/xpce-stub.c:406:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  return strcpy(malloc(strlen(program)+1), program);
data/swi-prolog-8.2.3+dfsg/src/config/wincfg.h:126:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#undef snprintf
data/swi-prolog-8.2.3+dfsg/src/config/wincfg.h:127:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf ms_snprintf		/* defined in pl-nt.c */
data/swi-prolog-8.2.3+dfsg/src/defatom.c:150:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	if ( sscanf(buf, "A%s \"%[^\"]\"", id, str) == 2 )
data/swi-prolog-8.2.3+dfsg/src/defatom.c:164:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
	if ( sscanf(buf, "F%s%d", id, &arity) == 2 )
data/swi-prolog-8.2.3+dfsg/src/minizip/miniunz.c:154:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(buffer,newdir);
data/swi-prolog-8.2.3+dfsg/src/os/SWI-Stream.h:352:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define	fprintf		Sfprintf
data/swi-prolog-8.2.3+dfsg/src/os/SWI-Stream.h:353:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define	printf		Sprintf
data/swi-prolog-8.2.3+dfsg/src/os/SWI-Stream.h:354:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define	vprintf		Svprintf
data/swi-prolog-8.2.3+dfsg/src/os/SWI-Stream.h:355:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define	vfprintf	Svfprintf
data/swi-prolog-8.2.3+dfsg/src/os/SWI-Stream.h:356:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define	sprintf		Ssprintf
data/swi-prolog-8.2.3+dfsg/src/os/SWI-Stream.h:357:9:  [4] (buffer) vsprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define	vsprintf	Svsprintf
data/swi-prolog-8.2.3+dfsg/src/os/SWI-Stream.h:361:9:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
#define popen		Sopen_pipe
data/swi-prolog-8.2.3+dfsg/src/os/dtoa.c:1770:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy((char*)decimalpoint_cache, (CONST char*)s0);
data/swi-prolog-8.2.3+dfsg/src/os/pl-cstack.c:351:14:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    if ( (fd=popen(cmd, "r")) )
data/swi-prolog-8.2.3+dfsg/src/os/pl-cstack.c:363:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  { strcpy(o, sep);
data/swi-prolog-8.2.3+dfsg/src/os/pl-cstack.c:852:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define ctime_r(timep, buf) strcpy(buf, ctime(timep))
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:206:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access(OsPath(path, tmp), access_mode(mode)) == 0 ? TRUE : FALSE;
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:286:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    { strcpy(lbuf, buf);
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:292:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(lbuf, f);
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:296:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(q, l);
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:325:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  { strcpy(buf, link);
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:1149:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, b);
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:1152:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(s, e);
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:1595:12:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	written = snprintf(baseBuffer(out, char), size, tmp, f->value.f);
data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c:621:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      { strcpy(path, entry);
data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c:624:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(&path[plen], prefix);
data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c:682:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(path, current);
data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c:683:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(&path[clen], prefix);
data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c:701:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    { strcpy(newp, path);
data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c:702:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      strcpy(&newp[plen], e->d_name);
data/swi-prolog-8.2.3+dfsg/src/os/pl-locale.c:78:12:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    return wcscpy(copy, in);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:890:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    return strcpy(buf, p);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:899:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
{ strcpy(buf, p);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:925:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
{ strcpy(buf, p);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1176:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(path, d->canonical);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1190:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(path, d->canonical);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1201:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(parent+strlen(parent), e);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1204:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(path, parent);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1399:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(tmp, s);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1465:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(dirname, e);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1466:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(path, dirname);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1567:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(expanded, value);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1610:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(expanded, value);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1733:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  { strcpy(path, file);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1746:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(&path[2], file);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1760:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(&path[cwdlen], file);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2044:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, rc);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2594:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(*e, name);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2596:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(&e[0][l], value);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2821:14:  [4] (shell) WinExec:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  int rval = WinExec(command, SW_SHOWNORMAL);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2869:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
{ return system(command);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2901:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      return strcpy(buffer, file);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2915:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	return strcpy(buffer, s);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2921:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  return strcpy(buffer, file ? file : buf);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2948:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(path, s);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2949:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(path, *ext);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2965:6:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
     access(s, X_OK) == 0)		/* can be executed? */
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2986:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    { strcpy(fullname, e);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2999:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(fullname, e);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:3009:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	return strcpy(fullname, e);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:3022:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(dir, program);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:3024:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	return strcpy(fullname, e);
data/swi-prolog-8.2.3+dfsg/src/os/pl-prologflag.c:1003:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		     &type, &access, &keep) )
data/swi-prolog-8.2.3+dfsg/src/os/pl-prologflag.c:1027:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  else if ( access != ATOM_read_write )
data/swi-prolog-8.2.3+dfsg/src/os/pl-prologflag.c:1029:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    PL_put_atom(a, access);
data/swi-prolog-8.2.3+dfsg/src/os/pl-prologflag.c:1216:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
unify_prolog_flag_access(prolog_flag *f, term_t access)
data/swi-prolog-8.2.3+dfsg/src/os/pl-prologflag.c:1220:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return PL_unify_atom(access, ATOM_read);
data/swi-prolog-8.2.3+dfsg/src/os/pl-prologflag.c:1222:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return PL_unify_atom(access, ATOM_write);
data/swi-prolog-8.2.3+dfsg/src/os/pl-prologflag.c:1265:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	    word scope, word access, word type,
data/swi-prolog-8.2.3+dfsg/src/os/pl-prologflag.c:1290:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	       (!access || unify_prolog_flag_access(f, access)) &&
data/swi-prolog-8.2.3+dfsg/src/os/pl-prologflag.c:1290:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	       (!access || unify_prolog_flag_access(f, access)) &&
data/swi-prolog-8.2.3+dfsg/src/os/pl-prologflag.c:1354:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	   (!access || unify_prolog_flag_access(f, access)) &&
data/swi-prolog-8.2.3+dfsg/src/os/pl-prologflag.c:1354:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	   (!access || unify_prolog_flag_access(f, access)) &&
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:2109:10:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	  __r = snprintf(fs, sizeof(fbuf), fm, a1); \
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:2112:12:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    __r = snprintf(fs, __r+1, fm, a1); \
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:2119:10:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	  __r = snprintf(fs, sizeof(fbuf), fm, a1, a2); \
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:2122:12:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	    __r = snprintf(fs, __r+1, fm, a1, a2); \
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:3386:8:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
#undef popen
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:3388:9:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
#define popen(cmd, how) pt_popen(cmd, how)
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:3466:14:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if ( (fd = popen(command, mode)) )
data/swi-prolog-8.2.3+dfsg/src/os/pl-string.c:52:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(copy, s);
data/swi-prolog-8.2.3+dfsg/src/os/pl-table.c:84:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  { LD->thread.info->access.kvs = t->kvs; \
data/swi-prolog-8.2.3+dfsg/src/os/pl-table.c:85:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    k = LD->thread.info->access.kvs; \
data/swi-prolog-8.2.3+dfsg/src/os/pl-table.c:89:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  { LD->thread.info->access.kvs = NULL; \
data/swi-prolog-8.2.3+dfsg/src/os/pl-text.c:937:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(msg,
data/swi-prolog-8.2.3+dfsg/src/os/windows/dwarf-debug.c:88:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    { strcpy(*symbol, diename);
data/swi-prolog-8.2.3+dfsg/src/os/windows/dwarf-debug.c:153:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(*srcline, "%s:%d", linesrc, (int)lineno);
data/swi-prolog-8.2.3+dfsg/src/os/windows/popen.c:73:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(Args, pEnvCMD);
data/swi-prolog-8.2.3+dfsg/src/os/windows/popen.c:75:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(Args, pDefaultCMD);
data/swi-prolog-8.2.3+dfsg/src/os/windows/popen.c:81:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(Args, strCommand);
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:228:9:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
      { _tcscpy(tmp, d);
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:229:2:  [4] (buffer) _tcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
	_tcscat(tmp, p);
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:231:9:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
      { _tcscpy(tmp, d);
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:234:9:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
      { _tcscpy(tmp, p);
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:452:2:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
	_tcscpy(ok, data.cFileName);
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:574:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
_xos_open(const char *path, int access, ...)
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:579:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  va_start(args, access);
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:586:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return _wopen(buf, access, mode);
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.h:69:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#undef access
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.h:86:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#define access _xos_access
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.h:144:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
_export int	_xos_open(const char *path, int access, ...);
data/swi-prolog-8.2.3+dfsg/src/pl-assert.c:71:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define ctime_r(timep, buf) strcpy(buf, ctime(timep))
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:365:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  { LD->thread.info->access.atom_table = GD->atoms.table; \
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:366:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    t = LD->thread.info->access.atom_table->table; \
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:367:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    b = LD->thread.info->access.atom_table->buckets; \
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:371:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  { LD->thread.info->access.atom_table = NULL; \
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:372:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    LD->thread.info->access.atom_bucket = NULL; \
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:376:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  { LD->thread.info->access.atom_bucket = (b); \
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:380:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  { LD->thread.info->access.atom_bucket = NULL; \
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:1889:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	{ strcpy(common, a->name+lp);
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:1936:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(buf, p);
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:1939:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  { strcat(buf, cmm);
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:2158:9:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
      { wcscpy(buffer, hit.text.w);
data/swi-prolog-8.2.3+dfsg/src/pl-ext.c:391:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
DECL_PLIST(system);
data/swi-prolog-8.2.3+dfsg/src/pl-ext.c:450:13:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  REG_PLIST(system);
data/swi-prolog-8.2.3+dfsg/src/pl-funcs.h:397:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
					term_t local, term_t access, term_t type,
data/swi-prolog-8.2.3+dfsg/src/pl-funcs.h:481:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
COMMON(void)		ddi_add_access_gen(DirtyDefInfo ddi, gen_t access);
data/swi-prolog-8.2.3+dfsg/src/pl-funcs.h:482:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
COMMON(int)		ddi_contains_gen(DirtyDefInfo ddi, gen_t access);
data/swi-prolog-8.2.3+dfsg/src/pl-funct.c:53:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  { LD->thread.info->access.functor_table = functorDefTable; \
data/swi-prolog-8.2.3+dfsg/src/pl-funct.c:54:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    t = LD->thread.info->access.functor_table->table; \
data/swi-prolog-8.2.3+dfsg/src/pl-funct.c:55:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    b = LD->thread.info->access.functor_table->buckets; \
data/swi-prolog-8.2.3+dfsg/src/pl-funct.c:59:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  { LD->thread.info->access.functor_table = NULL; \
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:346:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    { strcpy(o, s);
data/swi-prolog-8.2.3+dfsg/src/pl-global.h:173:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    Module	system;			/* system predicate module */
data/swi-prolog-8.2.3+dfsg/src/pl-incl.h:1505:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  gen_t		access[PROC_DIRTY_GENS];/* Accessed generations */
data/swi-prolog-8.2.3+dfsg/src/pl-incl.h:1570:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	do { DEBUG(CHK_SECURE, assert(!LD->thread.info->access.predicate)); \
data/swi-prolog-8.2.3+dfsg/src/pl-incl.h:1571:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	     LD->thread.info->access.predicate = def; } while(0)
data/swi-prolog-8.2.3+dfsg/src/pl-incl.h:1573:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	do { LD->thread.info->access.predicate = NULL; } while(0)
data/swi-prolog-8.2.3+dfsg/src/pl-incl.h:1575:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	do { store = LD->thread.info->access.predicate; \
data/swi-prolog-8.2.3+dfsg/src/pl-incl.h:1577:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	     LD->thread.info->access.predicate = def; } while(0)
data/swi-prolog-8.2.3+dfsg/src/pl-incl.h:1579:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	do { LD->thread.info->access.predicate = store; } while(0)
data/swi-prolog-8.2.3+dfsg/src/pl-incl.h:1783:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  unsigned	system     : 1;		/* system sourcefile: do not reload */
data/swi-prolog-8.2.3+dfsg/src/pl-incl.h:2287:36:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
#define MODULE_system	(GD->modules.system)
data/swi-prolog-8.2.3+dfsg/src/pl-index.c:1625:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  assert(LD->thread.info->access.predicate == ctx->predicate);
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:284:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(buf, buf2);
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:840:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    { strcpy(s, ext);
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:849:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(s, ext);
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:900:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(tmp, GD->paths.executable);
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:915:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    { strcpy(tmp, systemDefaults.home);
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:917:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(tmp, SWIPL_BOOT_BASE);
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:1569:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define ctime_r(timep, buf) strcpy(buf, ctime(timep))
data/swi-prolog-8.2.3+dfsg/src/pl-inline.h:589:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LD->thread.info->access.ldata = ld;
data/swi-prolog-8.2.3+dfsg/src/pl-inline.h:592:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LD->thread.info->access.ldata = NULL;
data/swi-prolog-8.2.3+dfsg/src/pl-load.c:314:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(symname, LD_SYMBOL_PREFIX);
data/swi-prolog-8.2.3+dfsg/src/pl-load.c:315:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(symname, fname);
data/swi-prolog-8.2.3+dfsg/src/pl-nt.c:148:5:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    vsprintf(buf, fm, args);
data/swi-prolog-8.2.3+dfsg/src/pl-ntconsole.c:91:3:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
  vsprintf(buf, fm, args);
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2109:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    { Ssprintf(o, "%s%lld", i==0?"":" ", ddi->access[i]);
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2116:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    { gen_t f = ddi->access[i++];
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2117:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      gen_t t = ddi->access[i++];
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2146:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
ddi_contains_gen(DirtyDefInfo ddi, gen_t access)
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2151:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    { if ( ddi->access[i] == access )
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2151:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    { if ( ddi->access[i] == access )
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2158:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    { if ( access >= ddi->access[i++] &&
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2158:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    { if ( access >= ddi->access[i++] &&
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2159:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	   access <= ddi->access[i++] )
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2159:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	   access <= ddi->access[i++] )
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2169:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
ddi_to_intervals(DirtyDefInfo ddi, gen_t access)
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2170:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
{ gen_t min = access;
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2171:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  gen_t max = access;
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2180:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  { gen_t a = ddi->access[i];
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2186:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ddi->access[0] = min;
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2187:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ddi->access[1] = max;
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2194:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
ddi_interval_add_access_gen(DirtyDefInfo ddi, gen_t access)
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2195:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
{ if ( access < ddi->access[0] ) ddi->access[0] = access;
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2195:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
{ if ( access < ddi->access[0] ) ddi->access[0] = access;
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2195:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
{ if ( access < ddi->access[0] ) ddi->access[0] = access;
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2195:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
{ if ( access < ddi->access[0] ) ddi->access[0] = access;
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2196:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if ( access > ddi->access[1] ) ddi->access[1] = access;
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2196:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if ( access > ddi->access[1] ) ddi->access[1] = access;
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2196:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if ( access > ddi->access[1] ) ddi->access[1] = access;
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2196:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if ( access > ddi->access[1] ) ddi->access[1] = access;
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2201:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
ddi_add_access_gen(DirtyDefInfo ddi, gen_t access)
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2204:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if ( !ddi_contains_gen(ddi, access) )
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2207:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	  ddi->access[ddi->count++] = access;
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2207:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	  ddi->access[ddi->count++] = access;
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2209:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	  ddi_to_intervals(ddi, access);
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2211:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      { ddi_interval_add_access_gen(ddi, access);
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2229:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    { if ( GLOBALLY_VISIBLE_CLAUSE(cl, ddi->access[i]) )
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2238:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    { gen_t f = ddi->access[i++];
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2239:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      gen_t t = ddi->access[i++];
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2258:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    { if ( ddi->access[i] < oldest )
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2259:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	oldest = ddi->access[i];
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2265:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    { gen_t f = ddi->access[i];
data/swi-prolog-8.2.3+dfsg/src/pl-setup.c:338:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  { strcpy(tmp, name+3);
data/swi-prolog-8.2.3+dfsg/src/pl-srcfile.c:366:8:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	 !sf->system &&
data/swi-prolog-8.2.3+dfsg/src/pl-srcfile.c:655:26:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	 PL_unify_atom(type, f->system ? ATOM_system : ATOM_user) )
data/swi-prolog-8.2.3+dfsg/src/pl-srcfile.c:832:14:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    if ( sf->system )
data/swi-prolog-8.2.3+dfsg/src/pl-sys.c:148:15:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
BeginPredDefs(system)
data/swi-prolog-8.2.3+dfsg/src/pl-thread.c:6690:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if ( info && info->access.kvs == kvs )
data/swi-prolog-8.2.3+dfsg/src/pl-thread.c:6712:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if ( info && info->access.atom_table == atom_table )
data/swi-prolog-8.2.3+dfsg/src/pl-thread.c:6730:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if ( info && info->access.atom_bucket == bucket )
data/swi-prolog-8.2.3+dfsg/src/pl-thread.c:6747:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if ( info && info->access.ldata == ld )
data/swi-prolog-8.2.3+dfsg/src/pl-thread.c:6769:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if ( info && info->access.atom_bucket )
data/swi-prolog-8.2.3+dfsg/src/pl-thread.c:6782:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      buckets[index] = info->access.atom_bucket;
data/swi-prolog-8.2.3+dfsg/src/pl-thread.c:6807:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if ( info && info->access.predicate )
data/swi-prolog-8.2.3+dfsg/src/pl-thread.c:6820:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      buckets[index] = info->access.predicate;
data/swi-prolog-8.2.3+dfsg/src/pl-thread.c:6846:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if ( i != me && info && info->access.functor_table == functor_table )
data/swi-prolog-8.2.3+dfsg/src/pl-thread.h:120:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  } access;
data/swi-prolog-8.2.3+dfsg/src/pl-thread.h:402:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#define release_ldata(ld)	(LD->thread.info->access.ldata = NULL)
data/swi-prolog-8.2.3+dfsg/src/pl-util.c:144:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(e, atom_summary(def->module->name, 50));
data/swi-prolog-8.2.3+dfsg/src/pl-util.c:150:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(e, atom_summary(def->functor->name, 50));
data/swi-prolog-8.2.3+dfsg/src/pl-util.c:169:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(e, atom_summary(fd->name, 50));
data/swi-prolog-8.2.3+dfsg/src/pl-util.c:208:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(tmp, atom_summary(key, 30));
data/swi-prolog-8.2.3+dfsg/src/pl-util.c:211:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy(tmp, string_summary(key, 30));
data/swi-prolog-8.2.3+dfsg/src/pl-util.c:227:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(tmp, atom_summary(sf->name, 50));
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:1673:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, state->load_state->load_dir);
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:1675:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(s, tail);
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:1681:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, raw);
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:2329:14:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    Sputc(f->system ? 's' : 'u', fd);
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:3261:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    { l = strcpy(load, absloadname);
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:3262:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      s = strcpy(save, abssavename);
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:3426:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  Sputc(f->system ? 's' : 'u', fd);
data/swi-prolog-8.2.3+dfsg/src/pl-write.c:171:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    { sprintf(buf, "S_%" PRId64, -n);
data/swi-prolog-8.2.3+dfsg/src/pl-write.c:180:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      { sprintf(buf, "%c%" PRId64, i+'A', j);
data/swi-prolog-8.2.3+dfsg/src/pl-write.c:1138:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(buf, "%" PRId64, n->value.i);
data/swi-prolog-8.2.3+dfsg/src/pl-xterm.c:281:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(arg, "-S%s/%d", BaseName(slavename, tmp), master);
data/swi-prolog-8.2.3+dfsg/src/pl-xterm.c:290:5:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    execvp("xterm", xterm_argv);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:80:9:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
#define popen _popen
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:403:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
{ return strcpy(xmalloc(strlen(in)+1), in);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:457:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf+1, "%s\"%s\"", prefix, from->list[n]);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:459:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf+1, "%s%s", prefix, from->list[n]);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:595:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(e, ext);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:978:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(tmp, "%s%d", base, (int)getpid());
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1066:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(tmp, "%s/lib", plbase);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1068:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(tmp, "%s/lib/%s", plbase, plarch);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1072:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(tmp, "%s/include", plbase);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1084:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(cmd, "%s --dump-runtime-variables", pl);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1088:14:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if ( (fd = popen(cmd, "r")) )
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1147:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buf, "%s/bin/%s", plbase, PROG_PL);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1149:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buf, "%s/bin/%s/%s", plbase, plarch, PROG_PL);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1196:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(to, arg);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1209:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(e, ld);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1220:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  { if ( (status=system(cmd)) != 0 )
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1239:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  { strcpy(ofile, out);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1241:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  { strcpy(ofile, cfile);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1243:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(ext, EXT_OBJ);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1309:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(e, s);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1331:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(tmp, "/out:%s", cout);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1387:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(tmp, "/out:%s", soout);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1415:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(&tmp[1], SO_FORMAT_LDFLAGS);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1456:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(plname, name);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1474:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
{ strcpy(to, name);
data/swi-prolog-8.2.3+dfsg/src/win32/console/complete.c:105:2:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
	_tcscpy(data->candidate, fdata.cFileName);
data/swi-prolog-8.2.3+dfsg/src/win32/console/complete.c:118:9:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
      { _tcscpy(data->candidate, fdata.cFileName);
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:327:9:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
      { _tcscpy(ok, data.cFileName);
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:340:5:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    _tcscpy(file, buf);
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:449:3:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
  _tcscpy(b->current_title, title);
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:546:5:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    _tcscpy(base, s);
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:3333:3:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
  _tcscpy(d->prompt, d->promptbuf);
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:3819:3:  [4] (format) vswprintf:
  Potential format string problem (CWE-134). Make format string constant.
  vswprintf(buf, sizeof(buf)/sizeof(TCHAR), fmt, args);
data/swi-prolog-8.2.3+dfsg/src/win32/console/edit.c:445:7:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
      _tcscpy(match, data->candidate);
data/swi-prolog-8.2.3+dfsg/src/win32/console/registry.c:44:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
reg_open_key(const TCHAR *path, HKEY parent, REGSAM access)
data/swi-prolog-8.2.3+dfsg/src/win32/console/registry.c:63:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return reg_open_key(sep, sub, access);
data/swi-prolog-8.2.3+dfsg/src/win32/console/registry.c:67:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if ( RegOpenKeyEx(parent, buf, 0L, KEY_READ, access) != ERROR_SUCCESS )
data/swi-prolog-8.2.3+dfsg/src/win32/console/registry.c:76:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
RegOpenKeyFromPath(const TCHAR *path, REGSAM access)
data/swi-prolog-8.2.3+dfsg/packages/clib/cgi.c:164:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ( (ct = getenv("CONTENT_TYPE")) &&
data/swi-prolog-8.2.3+dfsg/packages/clib/form.c:327:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ( (method = getenv("REQUEST_METHOD")) &&
data/swi-prolog-8.2.3+dfsg/packages/clib/form.c:329:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  { char *lenvar = getenv("CONTENT_LENGTH");
data/swi-prolog-8.2.3+dfsg/packages/clib/form.c:391:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  } else if ( (s = getenv("QUERY_STRING")) )
data/swi-prolog-8.2.3+dfsg/packages/clib/nonblockio.c:638:14:  [3] (misc) LoadLibraryEx:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
    netmsg = LoadLibraryEx("netmsg.dll", 0, LOAD_LIBRARY_AS_DATAFILE);
data/swi-prolog-8.2.3+dfsg/packages/clib/process.c:721:18:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
#define LOCK()   EnterCriticalSection(&process_lock);
data/swi-prolog-8.2.3+dfsg/packages/clib/process.c:731:3:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
{ InitializeCriticalSection(&process_lock);
data/swi-prolog-8.2.3+dfsg/packages/clib/winpipe.c:81:3:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
  InitializeCriticalSection(&p->mutex);
data/swi-prolog-8.2.3+dfsg/packages/clib/winpipe.c:93:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&p->mutex);
data/swi-prolog-8.2.3+dfsg/packages/clib/winpipe.c:110:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&pipe->mutex);
data/swi-prolog-8.2.3+dfsg/packages/clib/winpipe.c:146:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&pipe->mutex);
data/swi-prolog-8.2.3+dfsg/packages/jpl/src/main/c/jpl.c:362:24:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
#define LOCK_ENGINES() EnterCriticalSection(&engines_mutex)
data/swi-prolog-8.2.3+dfsg/packages/jpl/src/main/c/jpl.c:1946:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *cp = getenv("CLASSPATH");
data/swi-prolog-8.2.3+dfsg/packages/jpl/src/main/c/jpl.c:4552:3:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
  InitializeCriticalSection(&engines_mutex);
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:113:29:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
#define INIT_CONTEXT_LOCK() InitializeCriticalSection(&context_mutex)
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:114:25:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
#define LOCK_CONTEXTS()	EnterCriticalSection(&context_mutex)
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:4625:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
{ char *otz = getenv("TZ");
data/swi-prolog-8.2.3+dfsg/packages/semweb/mutex.h:69:28:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
#define simpleMutexInit(p)	InitializeCriticalSection(p)
data/swi-prolog-8.2.3+dfsg/packages/semweb/mutex.h:71:28:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
#define simpleMutexLock(p)	EnterCriticalSection(p)
data/swi-prolog-8.2.3+dfsg/packages/sgml/catalog.c:214:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ( (vs = getenv(name)) )
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:4301:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  { unsigned char random[SSL3_RANDOM_SIZE];
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:4303:32:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    SSL_get_client_random(ssl, random, SSL3_RANDOM_SIZE);
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:4305:44:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                         SSL3_RANDOM_SIZE, random) )
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:4308:32:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    SSL_get_server_random(ssl, random, SSL3_RANDOM_SIZE);
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:4310:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			 SSL3_RANDOM_SIZE, random) )
data/swi-prolog-8.2.3+dfsg/packages/swipl-win/main.cpp:124:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ( (logname = getenv("QDEBUG")) ) {
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/date.c:700:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
{ char *otz = getenv("TZ");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/passing.c:70:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  { EnterCriticalSection(&mutex);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/passing.c:98:3:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
{ InitializeCriticalSection(&mutex);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/self.c:326:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ( (h=getenv("PCEHOME")) )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/self.c:346:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ( (s = getenv(strName(name))) )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/self.c:795:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ( (s = getenv("HOSTNAME")) != NULL )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/self.c:1515:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ( getenv("PCEDEBUGBOOT") != NULL )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mscommon.c:112:5:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
    InitializeCriticalSection(&lock);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mscommon.c:116:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  { EnterCriticalSection(&lock);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mscommon.c:178:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&lock);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msprocess.c:162:10:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
    if ( CreateProcess(NULL,			/* executable */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msprocess.c:162:10:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
    if ( CreateProcess(NULL,			/* executable */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:721:10:  [3] (buffer) getwd:
  This does not protect against buffer overflows by itself, so use with
  caution (CWE-120, CWE-20). Use getcwd instead.
    if ( getwd(CWDdir) == 0 )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:93:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ( (s=getenv("TMPDIR")) && strlen(s) < sizeof(namebuf)-13 )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:113:15:  [3] (tmpfile) tempnam:
  Temporary file race condition (CWE-377).
    char *s = tempnam("c:\\tmp", "xpce");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:115:15:  [3] (tmpfile) tempnam:
  Temporary file race condition (CWE-377).
    char *s = tempnam("/tmp", "xpce");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:130:15:  [3] (tmpfile) tmpnam:
  Temporary file race condition (CWE-377).
    char *s = tmpnam(namebuf);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/x11.c:70:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
{ char *t = getenv("TERM");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdisplay.c:231:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ( isDefault(d->address) && !getenv("DISPLAY") )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xunix.c:63:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ( (name = getenv("USER")) )
data/swi-prolog-8.2.3+dfsg/src/minizip/crypt.h:112:9:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        srand((unsigned)(time(NULL) ^ ZCR_SEED2));
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:537:3:  [3] (random) srandom:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  srandom(seed);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:540:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  srand(seed);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:555:18:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  { uint64_t l = random();
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:557:20:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    l ^= (uint64_t)random()<<15;
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:558:20:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    l ^= (uint64_t)random()<<30;
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:559:20:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    l ^= (uint64_t)random()<<45;
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:740:15:  [3] (tmpfile) tmpnam:
  Temporary file race condition (CWE-377).
  rc = (tmp = tmpnam(NULL)) != NULL;
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1796:12:  [3] (buffer) getwd:
  This does not protect against buffer overflows by itself, so use with
  caution (CWE-120, CWE-20). Use getcwd instead.
    rval = getwd(buf);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2434:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *s = getenv(name);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2504:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ( !getenv(name) )
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:3003:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if  ((path = getenv("PATH") ) == 0)
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.h:80:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      if ( (f = getenv("SWI_DEBUG_IOREF")) )
data/swi-prolog-8.2.3+dfsg/src/os/windows/popen.c:70:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	pEnvCMD = getenv("COMSPEC");
data/swi-prolog-8.2.3+dfsg/src/os/windows/popen.c:83:7:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
	if (!CreateProcess( NULL, Args, NULL, NULL, FALSE,
data/swi-prolog-8.2.3+dfsg/src/os/windows/popen.c:83:7:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
	if (!CreateProcess( NULL, Args, NULL, NULL, FALSE,
data/swi-prolog-8.2.3+dfsg/src/os/windows/popen.c:109:18:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
#define LOCK()   EnterCriticalSection(&lock);
data/swi-prolog-8.2.3+dfsg/src/os/windows/popen.c:114:3:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
{ InitializeCriticalSection(&lock);
data/swi-prolog-8.2.3+dfsg/src/pl-alloc.c:1367:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ( getenv("MALLOC_TRACE") )		/* glibc malloc tracer */
data/swi-prolog-8.2.3+dfsg/src/pl-arith.c:707:18:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  if ( ld->arith.random.initialised )
data/swi-prolog-8.2.3+dfsg/src/pl-arith.c:713:29:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    gmp_randclear(ld->arith.random.state);
data/swi-prolog-8.2.3+dfsg/src/pl-arith.c:715:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    ld->arith.random.initialised = FALSE;
data/swi-prolog-8.2.3+dfsg/src/pl-arith.c:3877:25:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	gmp_randseed(LD->arith.random.state, seed);
data/swi-prolog-8.2.3+dfsg/src/pl-arith.c:3917:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  gmp_randseed(LD->arith.random.state, seed);
data/swi-prolog-8.2.3+dfsg/src/pl-arith.c:3949:31:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    gmp_randseed_ui(LD->arith.random.state, key);
data/swi-prolog-8.2.3+dfsg/src/pl-arith.c:3967:19:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  if ( !LD->arith.random.initialised )
data/swi-prolog-8.2.3+dfsg/src/pl-arith.c:3971:31:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    gmp_randinit_mt(LD->arith.random.state);
data/swi-prolog-8.2.3+dfsg/src/pl-arith.c:3973:36:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    gmp_randinit_default(LD->arith.random.state);
data/swi-prolog-8.2.3+dfsg/src/pl-arith.c:3975:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    LD->arith.random.initialised = TRUE;
data/swi-prolog-8.2.3+dfsg/src/pl-arith.c:4011:32:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	    gmp_randseed_ui(LD->arith.random.state,
data/swi-prolog-8.2.3+dfsg/src/pl-arith.c:4015:29:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	    gmp_randseed(LD->arith.random.state, n.value.mpz);
data/swi-prolog-8.2.3+dfsg/src/pl-arith.c:4036:25:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      mpz_set(LD->arith.random.state[0]._mp_seed, n.value.mpz);
data/swi-prolog-8.2.3+dfsg/src/pl-arith.c:4069:17:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      LD->arith.random.state[0]._mp_seed[0]._mp_size =
data/swi-prolog-8.2.3+dfsg/src/pl-arith.c:4070:17:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      LD->arith.random.state[0]._mp_seed[0]._mp_alloc;					      mpz_set(seed.value.mpz, LD->arith.random.state[0]._mp_seed);
data/swi-prolog-8.2.3+dfsg/src/pl-arith.c:4070:100:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      LD->arith.random.state[0]._mp_seed[0]._mp_alloc;					      mpz_set(seed.value.mpz, LD->arith.random.state[0]._mp_seed);
data/swi-prolog-8.2.3+dfsg/src/pl-arith.c:4104:44:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      mpz_urandomm(r->value.mpz, LD->arith.random.state, n1->value.mpz);
data/swi-prolog-8.2.3+dfsg/src/pl-arith.c:4138:33:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    mpf_urandomb(rop, LD->arith.random.state, sizeof(double)*8);
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:4930:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    { char *incr = getenv("PL_STACK_INCREMENT"); /* 1: random */
data/swi-prolog-8.2.3+dfsg/src/pl-global.h:590:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    } random;
data/swi-prolog-8.2.3+dfsg/src/pl-load.c:179:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define RUNNING_ON_VALGRIND (getenv("VALGRIND_OPTS") != NULL)
data/swi-prolog-8.2.3+dfsg/src/pl-mutex.h:85:28:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
#define simpleMutexInit(p)	InitializeCriticalSection(p)
data/swi-prolog-8.2.3+dfsg/src/pl-mutex.h:87:28:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
#define simpleMutexLock(p)	EnterCriticalSection(p)
data/swi-prolog-8.2.3+dfsg/src/pl-ntmain.c:99:18:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
#define LOCK()   EnterCriticalSection(&mutex)
data/swi-prolog-8.2.3+dfsg/src/pl-ntmain.c:1189:3:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
  InitializeCriticalSection(&mutex);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1308:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ( (s = getenv("LIB")) )
data/swi-prolog-8.2.3+dfsg/cmake/CheckAlignment.c:29:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char dummy[24];			/* var is not allowed */
data/swi-prolog-8.2.3+dfsg/cmake/CheckAlignment.c:43:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static const unsigned char int64_alignment[int64_pat_sz] = {
data/swi-prolog-8.2.3+dfsg/cmake/CheckAlignment.c:48:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static const unsigned char voidp_alignment[voidp_pat_sz] = {
data/swi-prolog-8.2.3+dfsg/cmake/CheckAlignment.c:53:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static const unsigned char double_alignment[double_pat_sz] = {
data/swi-prolog-8.2.3+dfsg/man/calc.c:9:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char expression[MAXLINE];
data/swi-prolog-8.2.3+dfsg/man/calc.c:12:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *plav[2];
data/swi-prolog-8.2.3+dfsg/packages/PDT/pdt_console.c:157:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { static char esc[2] = {ESC,ESC};
data/swi-prolog-8.2.3+dfsg/packages/archive/archive4pl.c:1076:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char lwr[50];
data/swi-prolog-8.2.3+dfsg/packages/bdb/bdb4pl.c:763:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  NOSIG(rval=dbh->db->open(dbh->db, TheTXN, fname, subdb, type, flags, m));
data/swi-prolog-8.2.3+dfsg/packages/bdb/bdb4pl.c:765:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  NOSIG(rval=dbh->db->open(dbh->db, fname, subdb, type, flags, m));
data/swi-prolog-8.2.3+dfsg/packages/bdb/bdb4pl.c:1553:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *config[MAXCONFIG];
data/swi-prolog-8.2.3+dfsg/packages/bdb/bdb4pl.c:1691:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (rval=env->env->open(env->env, home, flags, 0666)) != 0 )
data/swi-prolog-8.2.3+dfsg/packages/clib/bsd-crypt.c:245:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char b[8];
data/swi-prolog-8.2.3+dfsg/packages/clib/bsd-crypt.c:391:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const unsigned char S[8][64] = {	/* 48->32 bit substitution tables */
data/swi-prolog-8.2.3+dfsg/packages/clib/bsd-crypt.c:464:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char a64toi[128];	/* ascii-64 => 0..63 */
data/swi-prolog-8.2.3+dfsg/packages/clib/bsd-crypt.c:486:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char	cryptresult[1+4+4+11+1];	/* encrypted result */
data/swi-prolog-8.2.3+dfsg/packages/clib/bsd-crypt.c:771:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static unsigned char perm[64], tmp32[32];	/* "static" for speed */
data/swi-prolog-8.2.3+dfsg/packages/clib/bsd-crypt.c:806:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char pc2inv[64];
data/swi-prolog-8.2.3+dfsg/packages/clib/bsd-crypt.c:910:68:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
init_perm(C_block perm[64/CHUNKBITS][1<<CHUNKBITS], const unsigned char p[64],
data/swi-prolog-8.2.3+dfsg/packages/clib/cgi.c:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[100];
data/swi-prolog-8.2.3+dfsg/packages/clib/crypt.c:79:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char salt[64];
data/swi-prolog-8.2.3+dfsg/packages/clib/form.c:124:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char value[SHORTVALUE];
data/swi-prolog-8.2.3+dfsg/packages/clib/form.c:339:11:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    len = atol(lenvar);
data/swi-prolog-8.2.3+dfsg/packages/clib/form.c:350:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[100];
data/swi-prolog-8.2.3+dfsg/packages/clib/form.c:354:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(msg, "> %ld", (long)*lenp);
data/swi-prolog-8.2.3+dfsg/packages/clib/hash_stream.c:72:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char hex_output[len*2];
data/swi-prolog-8.2.3+dfsg/packages/clib/hash_stream.c:357:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { unsigned char hval[SHA2_MAX_DIGEST_SIZE];
data/swi-prolog-8.2.3+dfsg/packages/clib/md5.c:169:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(xbuf, data, 64);
data/swi-prolog-8.2.3+dfsg/packages/clib/md5.c:343:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pms->buf + offset, p, copy);
data/swi-prolog-8.2.3+dfsg/packages/clib/md5.c:357:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pms->buf, p, left);
data/swi-prolog-8.2.3+dfsg/packages/clib/md54pl.c:95:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char hex_output[16*2];
data/swi-prolog-8.2.3+dfsg/packages/clib/md5passwd.c:64:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char     passwd[120], *p;
data/swi-prolog-8.2.3+dfsg/packages/clib/md5passwd.c:66:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	final[16];
data/swi-prolog-8.2.3+dfsg/packages/clib/memfile.c:375:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    { memcpy(buf, &m->data[m->here], size);
data/swi-prolog-8.2.3+dfsg/packages/clib/memfile.c:379:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    { memcpy(buf, &m->data[m->here], before_gap);
data/swi-prolog-8.2.3+dfsg/packages/clib/memfile.c:395:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&buf[done], &m->data[start], left);
data/swi-prolog-8.2.3+dfsg/packages/clib/memfile.c:484:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&m->data[m->gap_start], buf, size);
data/swi-prolog-8.2.3+dfsg/packages/clib/nonblockio.c:252:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[256];
data/swi-prolog-8.2.3+dfsg/packages/clib/nonblockio.c:630:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[1024];
data/swi-prolog-8.2.3+dfsg/packages/clib/nonblockio.c:655:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  { sprintf(buf, "Unknown socket error (%u)", eno);
data/swi-prolog-8.2.3+dfsg/packages/clib/nonblockio.c:712:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[100];
data/swi-prolog-8.2.3+dfsg/packages/clib/nonblockio.c:718:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(tmp, "Unknown error %ld", error);
data/swi-prolog-8.2.3+dfsg/packages/clib/nonblockio.c:1162:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ip, &hip, sizeof(hip));
data/swi-prolog-8.2.3+dfsg/packages/clib/process.c:241:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(b->buffer+b->size, data, len*sizeof(echar));
data/swi-prolog-8.2.3+dfsg/packages/clib/process.c:744:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&Sprocessfilefunctions, &Sfilefunctions, sizeof(IOFUNCTIONS));
data/swi-prolog-8.2.3+dfsg/packages/clib/process.c:1667:9:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
#define vfork fork
data/swi-prolog-8.2.3+dfsg/packages/clib/process.c:1677:11:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
    pid = vfork();
data/swi-prolog-8.2.3+dfsg/packages/clib/process.c:1727:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ( (fd = open("/dev/null", O_RDONLY)) >= 0 )
data/swi-prolog-8.2.3+dfsg/packages/clib/process.c:1746:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ( (fd = open("/dev/null", O_WRONLY)) >= 0 )
data/swi-prolog-8.2.3+dfsg/packages/clib/process.c:1765:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ( (fd = open("/dev/null", O_WRONLY)) >= 0 )
data/swi-prolog-8.2.3+dfsg/packages/clib/prolog_stream.c:117:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    { memcpy(buf, &ctx->buffered[ctx->sent], left);
data/swi-prolog-8.2.3+dfsg/packages/clib/prolog_stream.c:122:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    { memcpy(buf, &ctx->buffered[ctx->sent], size);
data/swi-prolog-8.2.3+dfsg/packages/clib/readutil.c:59:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ wchar_t buf[BUFSIZE];
data/swi-prolog-8.2.3+dfsg/packages/clib/readutil.c:123:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ wchar_t buf[BUFSIZE];
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/hmac.c:66:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(cx->key + cx->klen, key, key_len);
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/hmac.c:107:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{   unsigned char dig[HASH_OUTPUT_SIZE];
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/hmac.h:92:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{   unsigned char   key[HASH_INPUT_SIZE];
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/pwd2key.c:53:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char uu[HASH_OUTPUT_SIZE], ux[HASH_OUTPUT_SIZE];
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/pwd2key.c:61:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(c2, c1, sizeof(hmac_ctx));
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/pwd2key.c:73:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(c3, c2, sizeof(hmac_ctx));
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/pwd2key.c:95:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(c3, c1, sizeof(hmac_ctx));
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/pwd2key.c:114:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   salt[32];
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/pwd2key.c:115:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   key[32];
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/pwd2key.c:167:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   key[256];
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha1.c:47:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#pragma intrinsic(memcpy)
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha1.c:121:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(v, ctx->hash, 5 * sizeof(uint_32t));
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha1.c:195:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(((unsigned char*)ctx->wbuf) + pos, sp, space);
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha1.c:201:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(((unsigned char*)ctx->wbuf) + pos, sp, len);
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha1b.c:47:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#pragma intrinsic(memcpy)
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha1b.c:120:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(v, ctx->hash, 5 * sizeof(uint_32t));
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha1b.c:222:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(w + pos, sp, space);
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha1b.c:228:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(w + pos, sp, (len + 7) >> 3);
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2.c:92:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#pragma intrinsic(memcpy)
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2.c:198:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(v, ctx->hash, 8 * sizeof(uint_32t));
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2.c:314:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(((unsigned char*)ctx->wbuf) + pos, sp, space);
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2.c:320:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(((unsigned char*)ctx->wbuf) + pos, sp, len);
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2.c:382:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->hash, i224, 8 * sizeof(uint_32t));
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2.c:411:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->hash, i256, 8 * sizeof(uint_32t));
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2.c:518:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(v, ctx->hash, 8 * sizeof(uint_64t));
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2.c:555:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(((unsigned char*)ctx->wbuf) + pos, sp, space);
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2.c:561:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(((unsigned char*)ctx->wbuf) + pos, sp, len);
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2.c:627:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->hash, i384, 8 * sizeof(uint_64t));
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2.c:660:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->hash, i512, 8 * sizeof(uint_64t));
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2.c:694:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(CTX_256(ctx)->hash, i224, 32);
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2.c:700:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(CTX_256(ctx)->hash, i256, 32);
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2.c:706:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(CTX_384(ctx)->hash, i384, 64);
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2.c:712:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(CTX_512(ctx)->hash, i512, 64);
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2b.c:91:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#pragma intrinsic(memcpy)
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2b.c:197:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(v, ctx->hash, 8 * sizeof(uint_32t));
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2b.c:341:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(w + pos, sp, space);
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2b.c:347:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(w + pos, sp, (len + 7) >> 3);
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2b.c:411:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->hash, i224, 8 * sizeof(uint_32t));
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2b.c:440:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->hash, i256, 8 * sizeof(uint_32t));
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2b.c:547:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(v, ctx->hash, 8 * sizeof(uint_64t));
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2b.c:612:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(w + pos, sp, space);
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2b.c:618:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(w + pos, sp, (len + 7) >> 3);
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2b.c:687:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->hash, i384, 8 * sizeof(uint_64t));
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2b.c:720:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->hash, i512, 8 * sizeof(uint_64t));
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2b.c:754:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(CTX_256(ctx)->hash, i224, 32);
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2b.c:760:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(CTX_256(ctx)->hash, i256, 32);
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2b.c:766:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(CTX_384(ctx)->hash, i384, 64);
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/sha2b.c:772:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(CTX_512(ctx)->hash, i512, 64);
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/shasum.c:13:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buf[BUF_SIZE], hval[SHA256_DIGEST_SIZE];
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/shasum.c:24:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if(!(inf = fopen(argv[1], "r")))
data/swi-prolog-8.2.3+dfsg/packages/clib/sha1/shasum.c:30:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	else if(!(inf = fopen(argv[1], "rb")))
data/swi-prolog-8.2.3+dfsg/packages/clib/sha4pl.c:159:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char hval[SHA2_MAX_DIGEST_SIZE];
data/swi-prolog-8.2.3+dfsg/packages/clib/sha4pl.c:210:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char hval[SHA2_MAX_DIGEST_SIZE];
data/swi-prolog-8.2.3+dfsg/packages/clib/sha4pl.c:258:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char digest[SHA2_MAX_DIGEST_SIZE];
data/swi-prolog-8.2.3+dfsg/packages/clib/socket.c:446:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char smallbuf[UDP_DEFAULT_BUFSIZE];
data/swi-prolog-8.2.3+dfsg/packages/clib/socket.c:602:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(sockaddr->sun_path, file_name_chars, nmlen);
data/swi-prolog-8.2.3+dfsg/packages/clib/socket.c:745:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[256];
data/swi-prolog-8.2.3+dfsg/packages/clib/uid.c:82:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1000];
data/swi-prolog-8.2.3+dfsg/packages/clib/uid.c:131:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1000];
data/swi-prolog-8.2.3+dfsg/packages/clib/unix.c:383:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fd = open("/dev/tty", 2)) )
data/swi-prolog-8.2.3+dfsg/packages/clib/uri.c:357:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(n, cb->base, sizeof(cb->tmp));
data/swi-prolog-8.2.3+dfsg/packages/clib/uri.c:384:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char tmp[6];
data/swi-prolog-8.2.3+dfsg/packages/clib/uuid.c:164:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[UUID_LEN_STR+1];
data/swi-prolog-8.2.3+dfsg/packages/clib/uuid.c:172:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[UUID_LEN_SIV+1];
data/swi-prolog-8.2.3+dfsg/packages/clib/winpipe.c:114:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    { memcpy(pipe->buf+pipe->in, buf, size);
data/swi-prolog-8.2.3+dfsg/packages/clib/winpipe.c:153:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, pipe->buf+pipe->out, avail);
data/swi-prolog-8.2.3+dfsg/packages/cpp/SWI-cpp.h:1122:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    return (char *)av[1];
data/swi-prolog-8.2.3+dfsg/packages/cpp/SWI-cpp.h:1128:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    return (char *)av[1];
data/swi-prolog-8.2.3+dfsg/packages/cpp/SWI-cpp.h:1143:13:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    return (wchar_t *)av[1];
data/swi-prolog-8.2.3+dfsg/packages/cpp/SWI-cpp.h:1149:13:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    return (wchar_t *)av[1];
data/swi-prolog-8.2.3+dfsg/packages/cpp/likes.cpp:31:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	cout << "\t" << (char *)av[0] << endl;
data/swi-prolog-8.2.3+dfsg/packages/cpp/likes.cpp:39:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	cout << "\t" << (char *)av[1] << endl;
data/swi-prolog-8.2.3+dfsg/packages/cpp/test.cpp:52:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    cout << (char *)av[0] << endl;
data/swi-prolog-8.2.3+dfsg/packages/http/cgi_stream.c:492:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char buf[256];
data/swi-prolog-8.2.3+dfsg/packages/http/cgi_stream.c:591:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&ctx->data[osize], buf, size);
data/swi-prolog-8.2.3+dfsg/packages/http/http_chunked.c:126:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char hdr[MAXHDR];
data/swi-prolog-8.2.3+dfsg/packages/http/json.c:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[FAST_BUFFER];
data/swi-prolog-8.2.3+dfsg/packages/http/json.c:180:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static char escape[128];
data/swi-prolog-8.2.3+dfsg/packages/http/multipart.c:146:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, ctx->unprocessed, len);
data/swi-prolog-8.2.3+dfsg/packages/http/multipart.c:172:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tmp[10000];
data/swi-prolog-8.2.3+dfsg/packages/http/multipart.c:173:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(tmp, in->bufp, in->limitp-in->bufp);
data/swi-prolog-8.2.3+dfsg/packages/http/multipart.c:306:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->boundary, "--", 2);
data/swi-prolog-8.2.3+dfsg/packages/http/multipart.c:307:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ctx->boundary+2, boundary, boundary_len);
data/swi-prolog-8.2.3+dfsg/packages/http/multipart.c:428:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	     memcpy(*out, _data, _len);			\
data/swi-prolog-8.2.3+dfsg/packages/http/websocket.c:292:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msk[4];
data/swi-prolog-8.2.3+dfsg/packages/http/websocket.c:335:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char hdr[WS_MAX_HEADER_LEN];
data/swi-prolog-8.2.3+dfsg/packages/http/websocket.c:391:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&ctx->data[osize], buf, size);
data/swi-prolog-8.2.3+dfsg/packages/http/websocket.c:804:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hdr[WS_MAX_HEADER_LEN];
data/swi-prolog-8.2.3+dfsg/packages/inclpr/inclpr.c:588:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char c[2];
data/swi-prolog-8.2.3+dfsg/packages/jpl/src/main/c/jpl.c:320:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char * jvm_ia[2] = {"-Xrs", NULL};
data/swi-prolog-8.2.3+dfsg/packages/jpl/src/main/c/jpl.c:389:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static char  v[100];    /* version string */
data/swi-prolog-8.2.3+dfsg/packages/jpl/src/main/c/jpl.c:1848:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(cpoptp, "-Djava.class.path="); /* was cpopt */
data/swi-prolog-8.2.3+dfsg/packages/libedit/libedit4pl.c:566:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cbuf[MB_LEN_MAX];
data/swi-prolog-8.2.3+dfsg/packages/libedit/libedit4pl.c:726:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  { memcpy(buf, line, linelen);
data/swi-prolog-8.2.3+dfsg/packages/libedit/libedit4pl.c:732:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, line, slen);
data/swi-prolog-8.2.3+dfsg/packages/libedit/libedit4pl.c:1205:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *av[EL_BIND_MAX_ARGS];
data/swi-prolog-8.2.3+dfsg/packages/libedit/libedit4pl.c:1362:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { wchar_t wc[2];
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/psfile.c:63:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fd = fopen(fname, "r")) )
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/psfile.c:64:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[MAXLINE];
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:297:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fd = fopen(name, "r")) )
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:652:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char b[MAXFUNC];
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:701:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(e->arguments, args, e->arg_count*sizeof(cmd_arg));
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:756:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(c->arguments, args, c->arg_count*sizeof(cmd_arg));
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:793:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char line[MAXCMD];
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1029:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char abuf[MAXARG];
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1063:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char end[MAXCMD];
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1064:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXVERBATIM];
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1118:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char ename[MAXCMD];
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1120:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *args[MAXCMDARGS];
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1143:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char abuf[MAXARG];
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1184:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[MAXVERB];
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1189:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ds[2];
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1243:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXMATH];
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1335:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { char buf[2];
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1348:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { char buf[2];
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1360:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { char buf[MAXCMD];
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1397:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { char buf[2];
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1409:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { char buf[MAXWORD];
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1478:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXOUTPUT];
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:2412:45:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  { FILE *fd = (streq(name, "-") ? stdout : fopen(name, "w"));
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:2503:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[l+1];
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:2505:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, s, l);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:2733:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char argstart[50];
data/swi-prolog-8.2.3+dfsg/packages/nlp/double_metaphone.c:1252:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char *result[2];
data/swi-prolog-8.2.3+dfsg/packages/nlp/isub.c:232:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t ws1[1024];
data/swi-prolog-8.2.3+dfsg/packages/nlp/isub.c:233:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t ws2[1024];
data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/examples/stemwords.c:179:32:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f_in = (in == 0) ? stdin : fopen(in, "r");
data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/examples/stemwords.c:184:35:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f_out = (out == 0) ? stdout : fopen(out, "w");
data/swi-prolog-8.2.3+dfsg/packages/nlp/pl-isub.c:68:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ wchar_t buf1[FAST_SIZE];
data/swi-prolog-8.2.3+dfsg/packages/nlp/pl-isub.c:69:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t buf2[FAST_SIZE];
data/swi-prolog-8.2.3+dfsg/packages/nlp/porter_stem.c:381:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];
data/swi-prolog-8.2.3+dfsg/packages/nlp/porter_stem.c:382:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char plain[1024];
data/swi-prolog-8.2.3+dfsg/packages/nlp/porter_stem.c:486:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[1024];
data/swi-prolog-8.2.3+dfsg/packages/nlp/porter_stem.c:686:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char buf[100];
data/swi-prolog-8.2.3+dfsg/packages/nlp/porter_stem.c:727:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char buf[100];
data/swi-prolog-8.2.3+dfsg/packages/nlp/porter_stem.c:798:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char tmp[1024];
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:249:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char	       buf[PARAM_BUFSIZE];	/* Small buffer for simple cols */
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:1059:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(cp, s, len+1);
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:1063:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(cp, w, (len+1)*sizeof(wchar_t));
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:1148:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(f->codes, info.buf, sizeof(code)*info.size);
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:1491:40:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     { if ( !get_atom_arg_ex(1, head, &open) )
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:1518:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ( !open )
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:1891:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char buf[256];
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:2104:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(new->sqltext.a, in->sqltext.a, bytes);
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:2125:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new->params, in->params, sizeof(parameter)*new->NumParams);
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:2178:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new->result, in->result, in->NumCols*sizeof(parameter));
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:3533:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(prm->ptr_value, &sqlval, sizeof(SQLINTEGER));
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:3544:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(prm->ptr_value, &sqlval, sizeof(SQLBIGINT));
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:3584:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(prm->ptr_value, ws, (ls+1)*sizeof(SQLWCHAR));
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:3595:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ char datetime_str[128];
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:3610:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(prm->ptr_value, s, len+1);
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:4295:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t fast[256];
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:4338:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[256];
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:4361:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(data, buf, sizeof(buf));
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:4409:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data, buf, sizeof(buf));	/* you don't get the data twice! */
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:4627:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char oenv[20];
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:4632:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(oenv, "TZ=");
data/swi-prolog-8.2.3+dfsg/packages/protobufs/protobufs.c:98:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char asCodes[sizeof(int32_t)];
data/swi-prolog-8.2.3+dfsg/packages/protobufs/protobufs.c:126:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char asCodes[sizeof(int64_t)];
data/swi-prolog-8.2.3+dfsg/packages/protobufs/protobufs.c:154:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char asCodes[sizeof(float)];
data/swi-prolog-8.2.3+dfsg/packages/protobufs/protobufs.c:187:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char asCodes[sizeof(double)];
data/swi-prolog-8.2.3+dfsg/packages/readline/readline4pl.c:139:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/readline/readline4pl.c:514:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, line, l);
data/swi-prolog-8.2.3+dfsg/packages/semweb/atom.c:232:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { unsigned char buf[256];
data/swi-prolog-8.2.3+dfsg/packages/semweb/atom.c:306:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t buf[256];
data/swi-prolog-8.2.3+dfsg/packages/semweb/atom_map.c:356:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static char tmp[20];
data/swi-prolog-8.2.3+dfsg/packages/semweb/atom_map.c:597:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char b[20];
data/swi-prolog-8.2.3+dfsg/packages/semweb/buffer.h:82:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      { memcpy(tmp, b->base, (char*)b->top - (char*)b->base);
data/swi-prolog-8.2.3+dfsg/packages/semweb/buffer.h:96:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      { memcpy(tmp, b->base, (char*)b->top - (char*)b->base);
data/swi-prolog-8.2.3+dfsg/packages/semweb/md5.c:169:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(xbuf, data, 64);
data/swi-prolog-8.2.3+dfsg/packages/semweb/md5.c:343:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pms->buf + offset, p, copy);
data/swi-prolog-8.2.3+dfsg/packages/semweb/md5.c:357:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pms->buf, p, left);
data/swi-prolog-8.2.3+dfsg/packages/semweb/ntriples.c:209:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ wchar_t fast[FAST_BUF_SIZE];
data/swi-prolog-8.2.3+dfsg/packages/semweb/ntriples.c:227:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    { memcpy(new, b->fast, sizeof(b->fast));
data/swi-prolog-8.2.3+dfsg/packages/semweb/query.c:121:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ char buf[64];
data/swi-prolog-8.2.3+dfsg/packages/semweb/query.c:138:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      { char buf[20];
data/swi-prolog-8.2.3+dfsg/packages/semweb/query.c:377:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static char tmp[24];
data/swi-prolog-8.2.3+dfsg/packages/semweb/query.c:403:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ char b[4][24];
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:343:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[3][24];
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:428:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *col_name[INDEX_TABLES] =
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:1021:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char buf[256];
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:1027:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(a, p->uri.text.a, p->uri.text.length);
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:1028:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&a[p->uri.text.length], ai.text.a, ai.text.length);
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:1034:7:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { wchar_t buf[256];
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:1493:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { static char *ring[10];
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:1495:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[25];
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:1542:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cloud->members, p, sizeof(predicate*)*count);
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:1694:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&new_members[0],        c1->members, c1->size*sizeof(predicate*));
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:1695:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&new_members[c1->size], c2->members, c2->size*sizeof(predicate*));
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:1730:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&new_hashes[0], c1->alt_hashes,
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:1743:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    { memcpy(&c1->alt_hashes[c1->alt_hash_count],
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:2053:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  DEBUG(1, { char buf[4][24];
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:2068:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  DEBUG(1, { char buf[2][24];
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:2346:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char b[2][24];
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:3034:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  { memcpy(g->unmodified_digest, g->digest, 16);
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:4171:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { DEBUG(2, { char buf[2][64];
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:4203:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[64];
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:4281:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[64];
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:5671:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { char buf[1024];
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:5687:7:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      wchar_t buf[1024];
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:6193:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char hex_output[16*2];
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.h:541:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[CHUNKSIZE];
data/swi-prolog-8.2.3+dfsg/packages/semweb/skiplist.c:171:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, payload, sl->payload_size);
data/swi-prolog-8.2.3+dfsg/packages/semweb/snapshot.c:105:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    DEBUG(1, { char buf[64];
data/swi-prolog-8.2.3+dfsg/packages/semweb/snapshot.c:177:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[64];
data/swi-prolog-8.2.3+dfsg/packages/semweb/snapshot.c:180:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf2[64];
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:184:7:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      wchar_t	 fast[FAST_URI];	/* Buffer for short URIs */
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:303:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ wchar_t fast[FAST_BUF_SIZE];
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:321:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    { memcpy(new, b->fast, sizeof(b->fast));
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:740:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t *save_buf[MAX_SAVEP];
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:1521:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char sbuf[256];
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:1522:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pbuf[256];
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:1523:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char obuf[256];
data/swi-prolog-8.2.3+dfsg/packages/semweb/xsd.c:101:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[10];
data/swi-prolog-8.2.3+dfsg/packages/semweb/xsd.c:102:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf, "%f", 1.0);
data/swi-prolog-8.2.3+dfsg/packages/semweb/xsd.c:113:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char fast[64];
data/swi-prolog-8.2.3+dfsg/packages/sgml/dtd.h:300:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t *argv[2];			/* context arguments */
data/swi-prolog-8.2.3+dfsg/packages/sgml/dtd.h:417:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		ends[SHORTMAP_SIZE];	/* ending-characters in map */
data/swi-prolog-8.2.3+dfsg/packages/sgml/dtd.h:435:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ unsigned char	class[INPUT_CHARSET_SIZE]; /* ichar --> class-mask */
data/swi-prolog-8.2.3+dfsg/packages/sgml/error.c:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msgbuf[1024];
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:2730:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { wchar_t buf[MAXNMLEN+50];
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:3487:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(atts->attributes, atts->local, bytes);
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:3831:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[32];
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5072:4:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ wchar_t buf[3];
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5532:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ wchar_t buf[MAX_MESSAGE_LEN+1];
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5539:7:  [2] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
      wcscpy(s, L"Error: ");
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5542:7:  [2] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
      wcscpy(s, L"Warning: ");
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5592:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t buf[MAX_MESSAGE_LEN+1];
data/swi-prolog-8.2.3+dfsg/packages/sgml/quote.c:62:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char     buffer[1024];
data/swi-prolog-8.2.3+dfsg/packages/sgml/quote.c:93:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(b->bufp, b->buffer, used);
data/swi-prolog-8.2.3+dfsg/packages/sgml/quote.c:147:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  { memcpy(b->end, s, len+1);
data/swi-prolog-8.2.3+dfsg/packages/sgml/quote.c:204:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { char buf[20];
data/swi-prolog-8.2.3+dfsg/packages/sgml/quote.c:206:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "&#%d;", c);
data/swi-prolog-8.2.3+dfsg/packages/sgml/quote.c:230:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { char buf[20];
data/swi-prolog-8.2.3+dfsg/packages/sgml/quote.c:232:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "&#%d;", c);
data/swi-prolog-8.2.3+dfsg/packages/sgml/sgml.c:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[MB_CUR_MAX];
data/swi-prolog-8.2.3+dfsg/packages/sgml/sgml.c:415:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char doctype[256];
data/swi-prolog-8.2.3+dfsg/packages/sgml/util.c:402:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf->data.w, buf->localbuf, bytes);
data/swi-prolog-8.2.3+dfsg/packages/sgml/util.c:425:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buf->data.w, buf->localbuf, sizeof(buf->localbuf));
data/swi-prolog-8.2.3+dfsg/packages/sgml/util.c:584:3:  [2] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
  wcscpy(&buf[len-5], L" ... ");
data/swi-prolog-8.2.3+dfsg/packages/sgml/util.c:618:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[6];
data/swi-prolog-8.2.3+dfsg/packages/sgml/util.c:661:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    f = fopen(mbs, mode);
data/swi-prolog-8.2.3+dfsg/packages/sgml/util.c:680:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(mbs, flags);
data/swi-prolog-8.2.3+dfsg/packages/sgml/util.h:63:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t localbuf[256];		/* Initial local store */
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:60:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[10];
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:61:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf, "%f", 1.0);
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:121:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ char fast[64];
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:154:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char buf[32];
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:189:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf(e, "%d", atoi(e)+exp_shift);
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:189:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  sprintf(e, "%d", atoi(e)+exp_shift);
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:197:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(e, "E%d", exp_shift);
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:558:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  { sprintf(buf, "%02d", t->second.i);
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:564:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(&buf[1], "%f", t->second.f);
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:669:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[100], b2[20];
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:725:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(out, "%c%02d:%02d", sign, tza/3600, (tza % 3600)/60);
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:741:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf, "%02d-%02d",
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:763:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%02d", v);
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:767:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%02d", v);
data/swi-prolog-8.2.3+dfsg/packages/ssl/crypto4pl.c:461:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char digest[EVP_MAX_MD_SIZE];
data/swi-prolog-8.2.3+dfsg/packages/ssl/crypto4pl.c:628:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char digest[DIGEST_LEN];
data/swi-prolog-8.2.3+dfsg/packages/ssl/crypto4pl.c:1361:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char authtag[MAX_AUTHLEN];
data/swi-prolog-8.2.3+dfsg/packages/ssl/cryptolib.c:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char tmp[512];
data/swi-prolog-8.2.3+dfsg/packages/ssl/cryptolib.c:113:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[256];
data/swi-prolog-8.2.3+dfsg/packages/ssl/cryptolib.c:115:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *component[5] = {NULL, "unknown", "unknown", "unknown", "unknown"};
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:406:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[24];
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:420:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(pbuffer, source, 10);
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:431:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(pbuffer, source, 12);
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:546:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char digest[EVP_MAX_MD_SIZE];
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:581:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char digest[EVP_MAX_MD_SIZE];
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:1123:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen(filename, "r");
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:1617:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      { memcpy(buf, passwd, len+1);
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:2254:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char  subject[256];
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:2255:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char  issuer [256];
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:2393:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char errmsg[1024];
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:2571:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *cafile = fopen(cacert_filename, "rb");
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:3433:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(protos_vec + current_size + 1, proto, proto_len);
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:3723:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        { FILE *file = fopen(PL_atom_chars(crl_name), "rb");
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:4019:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(old->alpn_protos, protos_copy, old->alpn_protos_len);
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:4146:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { char msg[1024];
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:4301:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { unsigned char random[SSL3_RANDOM_SIZE];
data/swi-prolog-8.2.3+dfsg/packages/swipl-win/SwiPrologEngine.cpp:119:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(buf, buffer, l);
data/swi-prolog-8.2.3+dfsg/packages/swipl-win/Swipl_IO.cpp:142:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(buf, buffer, l);
data/swi-prolog-8.2.3+dfsg/packages/swipl-win/main.cpp:127:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	    logfile = fopen(logname, "w");
data/swi-prolog-8.2.3+dfsg/packages/table/error.c:101:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char buf[1024];
data/swi-prolog-8.2.3+dfsg/packages/table/error.c:107:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char buf[1024];
data/swi-prolog-8.2.3+dfsg/packages/table/order.h:50:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char ords[256];		/* mapping of the table */
data/swi-prolog-8.2.3+dfsg/packages/table/table.c:287:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[1024];
data/swi-prolog-8.2.3+dfsg/packages/table/table.c:613:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&table->fields[0], fields, sizeof(struct fieldtag)*nfields);
data/swi-prolog-8.2.3+dfsg/packages/table/table.c:711:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (table->fd = open(PL_atom_chars(table->file), O_RDONLY)) < 0 )
data/swi-prolog-8.2.3+dfsg/packages/table/table.c:1297:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1024];
data/swi-prolog-8.2.3+dfsg/packages/table/table.c:1597:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[1024];
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipc.c:548:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[TIPC_MAXDATA];
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipc.c:845:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     char asCodes[sizeof(struct tipc_event)];
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipc.c:936:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
{ FILE *fp = fopen("/sys/module/tipc/version", "r");
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipc.c:939:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char buf[32];
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:131:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char addr_area[2][16];
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:135:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(&addr_area[addr_crs][0], "<%u.%u.%u>",
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:142:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char addr_area[30];
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:218:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(nla_data(nla), str, attrlen);
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:253:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char payload[0];
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:281:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&request_msg->payload[0], header, header_len);
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:283:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&request_msg->payload[header_len], request, request_len);
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:348:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(header, &reply_msg->payload[0], header_len);
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:357:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(reply, &reply_msg->payload[header_len], len);
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:369:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char value[GENL_NAMSIZ];
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:382:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char request[NLA_SIZE(struct nlattr_family_name)];
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:385:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char reply[256];
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:458:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[MAX_TLVS_SPACE];
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:507:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rep_tlv, ans.buf, msg_space);
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:1215:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bearer_name[TIPC_MAX_BEARER_NAME];
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:1249:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char addr_area[128];
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:1257:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addr_area,
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:1266:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addr_area, "SOCK_ADDR_IPV4(%u.%u.%u.%u:",
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:1269:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(&addr_area[len], "%u)",
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:1275:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addr_area, "SOCK_DESCR(%u)",
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:1281:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(addr_area, "UNKNOWN(%u):", addr_type);
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:1283:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(&addr_area[2 * i], "%02x ", addr[i]);
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:1293:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char addr_area[128];
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:1294:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_name[TIPC_MAX_LINK_NAME];
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:1317:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_name[TIPC_MAX_LINK_NAME];
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:1334:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char link_name[TIPC_MAX_LINK_NAME];
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:1572:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char args[128];
data/swi-prolog-8.2.3+dfsg/packages/utf8proc/ruby/utf8proc_native.c:116:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[4];
data/swi-prolog-8.2.3+dfsg/packages/utf8proc/unicode4pl.c:236:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[10];
data/swi-prolog-8.2.3+dfsg/packages/windows/plregtry.c:269:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char kname[256];
data/swi-prolog-8.2.3+dfsg/packages/windows/plregtry.c:271:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cname[256];
data/swi-prolog-8.2.3+dfsg/packages/windows/plregtry.c:424:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char name[256];
data/swi-prolog-8.2.3+dfsg/packages/xpce/lib/xcnvcurs.c:41:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char 				line[1024];
data/swi-prolog-8.2.3+dfsg/packages/xpce/lib/xcnvcurs.c:163:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  { FILE  *in = fopen(argv[1], "rb");
data/swi-prolog-8.2.3+dfsg/packages/xpce/lib/xcnvcurs.c:164:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *out = fopen(argv[2], "wb");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/date.c:417:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char date[30];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/date.c:422:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(date, ", ");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/date.c:440:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char date[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/date.c:442:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(date, "%04d-%02d-%02dT%02d:%02d:%02dZ",
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/date.c:702:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char oenv[20];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/date.c:707:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(oenv, "TZ=");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/number.c:114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/point.c:69:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[200];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/real.c:139:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/real.c:141:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf, "%g", valReal(r));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/size.c:63:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[200];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/find_names.c:80:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
{ FILE *fd = fopen(file, "r");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/find_names.c:81:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/find_names.c:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nbuf[200];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/find_names.c:143:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prolog[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/find_names.c:176:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( !(ic = fopen(argv[0], "w")) ||
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/find_names.c:177:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
       !(ih = fopen(argv[1], "w")) )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gnu/getdate.c:94:65:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#if !defined (HAVE_BCOPY) && defined (HAVE_MEMCPY) && !defined (bcopy)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gnu/getdate.c:95:10:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
# define bcopy(from, to, len) memcpy ((to), (from), (len))
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gnu/getdate.c:95:31:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
# define bcopy(from, to, len) memcpy ((to), (from), (len))
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gnu/getdate.c:1312:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	      strcpy(msg, "parse error");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gnu/getdate.c:1790:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[20];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gnu/getdate.c:1975:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[MAX_BUFF_LEN + 1];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/colour.c:73:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[50];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/colour.c:75:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "#%02x%02x%02x",
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/font.c:209:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/font.c:212:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  { strcpy(buf, "Helvetica");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/font.c:215:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(buf, "-Bold");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/font.c:217:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(buf, "-Oblique");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/font.c:219:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  { strcpy(buf, "Times");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/font.c:222:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(buf, "-Bold");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/font.c:224:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(buf, "-Italic");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/font.c:226:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(buf, "-Roman");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/font.c:228:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  { strcpy(buf, "Helvetica");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/font.c:230:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  { strcpy(buf, "Courier");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/font.c:233:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(buf, "-Bold");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/font.c:235:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(buf, "-Oblique");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/pixmap.c:177:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/pixmap.c:178:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "grey%d", 100-(int)valInt(grey));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/postscript.c:155:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char tmp[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/postscript.c:179:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  case 'D':	sprintf(tmp, "%d", va_arg(args, int));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/postscript.c:184:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(tmp, "%.2f", va_arg(args, double));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/postscript.c:331:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			{ char tmp[8];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/postscript.c:332:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			  sprintf(tmp, "\\%03o", (unsigned int)c);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/postscript.c:991:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  char name[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/kernel.h:238:35:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define cpdata(to, from, type, n) memcpy(to, from, (n)*sizeof(type))
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/stream.h:361:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define fopen		Sopen_file
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/xos.h:48:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define open			_xos_open
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/xos.h:49:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define fopen(path, mode)	_xos_fopen(path, mode)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/gifread.c:140:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char version[4];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/gifread.c:320:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buf[256];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/gifread.c:348:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "UNKNOWN (0x%02x)", label);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/giftoxpm.c:82:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  { sprintf(c->c_color, "#%02x%02x%02x", r, g, b);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/giftoxpm.c:107:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(c->c_color, "None");	/* malloced 8 bytes, so ok. */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/gifwrite.c:747:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char accum[ 256 ];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/jpegtoxpm.c:111:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(c->c_color, "#%02x%02x%02x", r, g, b);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/jpegtoxpm.c:153:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  { char buf[1024];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/asfile.c:401:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      { memcpy(buf, s->s_textW, s->s_size*sizeof(charW));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/cpointer.c:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[20];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/cpointer.c:60:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf, "%p", p->pointer);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/hostdata.c:129:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char tmp[25];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/interface.c:224:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char tmp[256];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/interface.c:233:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char tmp[256];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/iostream.c:98:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      { memcpy(buf, s->s_textW, s->s_size*sizeof(charW));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/iostream.c:103:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      { memcpy(buf, s->s_textA, s->s_size);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/class.c:1287:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/classstub.c:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char tmp[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/classstub.c:153:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/classvar.c:465:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ wchar_t buf[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/classvar.c:530:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ wchar_t buf[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/classvar.c:727:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char line[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/classvar.c:789:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ char localbuf[LBUFSIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:41:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char tmp[25];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:56:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  { sprintf(tmp, "%g", valReal(obj));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:182:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *ppring[PPRINGSIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:215:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:217:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "%p", n);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:234:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char tmp[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:235:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char summary[256];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:260:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(summary, " ...");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:269:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    { sprintf(summary, "%g", valReal(obj));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:293:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(tmp, " (freed)");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:295:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(tmp, " (unlinking)");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:300:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(tmp, "%p", obj);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:344:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char tmp[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:345:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(tmp, "0x%lx", (unsigned long)obj);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:432:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char tmp[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:433:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(tmp, "0x%lx", (unsigned long)obj);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/debug.c:42:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[25];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/debug.c:65:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(tmp, "%d", sig);	break;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/debug.c:97:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char line[256];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:375:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ wchar_t buf[10];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:397:5:  [2] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
  { wcscpy(buf, L"\\e");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:407:7:  [2] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant string.
      wcscat(buf, L"\\e");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:410:7:  [2] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant string.
      wcscat(buf, L"SPC");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:413:7:  [2] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant string.
      wcscat(buf, L"TAB");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:416:7:  [2] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant string.
      wcscat(buf, L"RET");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:419:7:  [2] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant string.
      wcscat(buf, L"LFD");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:422:7:  [2] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant string.
      wcscat(buf, L"DEL");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:429:2:  [2] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant string.
	wcscat(buf, L"\\C-");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:436:4:  [2] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant string.
	  wcscat(buf, L"\\C-");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:603:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ char fmtbuf[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:645:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      char buf[64];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:703:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      char buf[64];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:774:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		arg = atoi(fmtbuf+1);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/method.c:306:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ wchar_t buf[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/method.c:431:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/object.c:756:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char tmp[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/object.c:2191:51:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      rval = getObjectFromReferencePce(PCE, toInt(atol(start)));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/object.c:2642:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/save.c:522:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[4];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/save.c:713:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char tmp[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/self.c:241:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char errmsg[64];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/self.c:249:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(errmsg, "Unknown OS Error (%d)", errno);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/self.c:756:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[27];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/self.c:798:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(buf, "doshost");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/self.c:863:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/self.c:924:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char line[256];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/self.c:1177:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char v[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/srclocation.c:72:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char lb[20];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/srclocation.c:92:35:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		       StringToName(&fn), toInt(atol(lb)), EAV));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/srclocation.c:111:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/trace.c:101:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/trace.c:111:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *argv[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/trace.c:128:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      numarg = toInt(atoi(argv[1]));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/type.c:1125:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t text[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/variable.c:387:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ wchar_t buf[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/variable.c:459:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ wchar_t buf[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/md.h:110:33:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define memmove(to, from, size)	bcopy(from, to, size)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/dialogitem.c:482:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char used[ACC_CHARSETSIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/dialogitem.c:547:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char buf[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/intitem.c:82:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[48];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/intitem.c:84:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s1[24], s2[24];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/intitem.c:182:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/intitem.c:195:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf, "%ld", val);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/slider.c:159:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/slider.c:212:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/slider.c:251:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char buf[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msg/var.c:222:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char varname[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msg/var.c:224:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(varname, "arg%d", n);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mscolour.c:61:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mscolour.c:91:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char line[256];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mscolour.c:93:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char name[80];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mscolour.c:164:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char line[256];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mscolour.c:166:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char name[80];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mscolour.c:198:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char name[256];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mscolour.c:264:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mscursor.c:484:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&glyphs->header, &x11_glyph_header, sizeof(x11_glyph_header));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msdraw.c:82:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int		open;			/* is context opened? */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msdraw.c:493:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
{ if ( context.open )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msdraw.c:2929:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  { char buf[32];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msdraw.c:2934:8:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	      strcat(buf, " ...");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msfont.c:182:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char att[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msfont.c:274:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(lfont.lfFaceName, "symbol");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msfont.c:322:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[256];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msfont.c:375:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[256];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msframe.c:60:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(copy, in, bytes);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msframe.c:72:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { TCHAR buf[50];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msframe.c:108:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { TCHAR buf[50];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msframe.c:936:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char signx[10], signy[10];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msframe.c:944:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  { int n = atoi(e+1);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msimage.c:210:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&bmi->bmiHeader, &bmih, sizeof(bmih));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msimage.c:237:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char xcolorname[8];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msimage.c:240:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(xcolorname, "#%02x%02x%02x",
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msjpeg.c:277:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    { char buf[1024];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msjpeg.c:311:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&dib->bmiColors[0], cmap->dib_colours,
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msjpeg.c:516:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(p, data+y*inlensl, outlensl);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msjpeg.c:603:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(out, in, outlensl);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msmetafile.c:436:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char fn[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msmetafile.c:711:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fn[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msprinter.c:298:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fname[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msprinter.c:343:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      strcpy(fname, &((char *)names)[names->wOutputOffset]);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msprocess.c:120:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmdline[MAXCMDLINE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msprocess.c:121:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dirbuf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msreadimage.c:157:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msreadimage.c:159:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name_and_type[LINESIZE];		/* an input line */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msstream.c:109:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[4*1024];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msstream.c:253:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[50];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msstream.c:255:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "PceSocketWin%d", (int)(intptr_t)PceHInstance);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswin.c:256:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[256];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswin.c:273:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[MAX_PATH];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswin.c:332:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR msg[MAXMESSAGE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswin.c:439:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR filter[1024], *ef = filter;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswin.c:440:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR buffer[2048];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswin.c:441:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR dirbuf[1024];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswin.c:573:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswin.c:597:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR szDir[MAX_PATH];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswin.c:644:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { wchar_t windir[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswin.c:656:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { TCHAR path[MAX_PATH];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswin.c:661:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswindow.c:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[50];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswindow.c:54:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "PceWindow%d", (int)(intptr_t)PceHInstance);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswindow.c:128:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/multimon.h:53:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR       szDevice[CCHDEVICENAME];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/multimon.h:59:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR       szDevice[CCHDEVICENAME];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/prg/tokeniser.c:374:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/prg/tokeniser.c:384:31:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ( tisstringescape(s, open, c) )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/prg/tokeniser.c:385:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      { if ( c == open )		/* escape as double "" or '' */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/prg/tokeniser.c:388:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  if ( c2 == open )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/prg/tokeniser.c:403:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	  if ( c2 != open )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/prg/tokeniser.c:410:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ( c == open )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/prg/tokeniser.c:417:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/prg/tokeniser.c:498:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/prg/tokeniser.c:512:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regc_color.c:186:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(VS(newt->tcolor), VS(t->tcolor),
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regc_color.c:189:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(VS(newt->tptr), VS(t->tptr),
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regc_color.c:249:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(VS(new), VS(cm->cdspace), cm->ncds *
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regc_color.c:477:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(VS(t->tptr), VS(fillt->tptr),
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regcomp.c:469:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(VS(p), VS(v->subs),
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regcomp.c:1968:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char idbuf[50];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regcomp.c:2138:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char idbuf[50];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regcomp.c:2192:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf, "%d", t->retry);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regcomp.c:2194:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(buf, "%p", t);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regerror.c:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char convbuf[sizeof(unk)+50];	/* 50 = plenty for int */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regerror.c:73:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(convbuf, "%d", r->code);	/* -1 for unknown */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regerror.c:77:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		icode = atoi(errbuf);	/* not our problem if this fails */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regerror.c:84:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(convbuf, "REG_%u", (unsigned)icode);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regexec.c:252:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(VS(pmatch), VS(v->pmatch), n*sizeof(regmatch_t));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regexec.c:278:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	chr *open;		/* open and close of range of possible starts */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regexec.c:309:40:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	MDEBUG(("between %ld and %ld\n", LOFF(open), LOFF(close)));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regexec.c:313:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	for (begin = open; begin <= close; begin++) {
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regexec.c:405:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	chr *open;		/* open and close of range of possible starts */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regexec.c:424:42:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		MDEBUG(("cbetween %ld and %ld\n", LOFF(open), LOFF(close)));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regexec.c:425:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		for (begin = open; begin <= close; begin++) {
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/test.c:51:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ebuf[1024];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/test/m-model.c:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[10];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/test/m-model.c:69:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *decl[MAX_DECL];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/test/m-model.c:82:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { static char msg[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/test/m-model.c:84:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg, "POINTER_OFFSET=0x%08xL", gva & 0xfC000000L );
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/chararray.c:52:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(n->data.s_textA, value->data.s_textA, str_datasize(&n->data));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/chararray.c:71:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(clone->data.s_textA, str->data.s_textA, str_datasize(&str->data));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/editor.c:2628:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ( open )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/i18n.c:175:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char b[MB_LEN_MAX];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/regex.c:183:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[1024];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/str.c:87:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *str_ring[STR_RING_SIZE] = {NULL};
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/str.c:245:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&dest->s_textA[at], &src->s_textA[from], len * sizeof(charA));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/str.c:966:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(b2, tmp->buffer, s->s_size);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/str.c:992:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(s->s_textA, tmp->buffer, sizeof(tmp->buffer));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/str.c:996:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(s->s_textA, tmp->buffer, sizeof(tmp->buffer));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/string.c:180:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(str->data.s_textA, v->data.s_textA, str_datasize(&v->data));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/string.c:590:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(s2.s_textA, s->s_textA, str_datasize(s));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/syntax.c:72:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(t->table,   flags,   FLAGS_SIZE(t));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/syntax.c:73:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(t->context, context, CONTEXT_SIZE(t));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/syntax.c:170:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(t1->table,   t2->table,   FLAGS_SIZE(t1));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/syntax.c:171:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(t1->context, t2->context, CONTEXT_SIZE(t1));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/syntax.c:321:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { char buf[2];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/syntax.c:333:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	   { char buf[3];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/syntax.c:352:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { char buf[2];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/syntax.c:364:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	   { char buf[3];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/textbuffer.c:233:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(clone->tb_bufferA, tb->tb_bufferA, bytes);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/utf8.c:132:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char out[10];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/utf8.c:148:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char out[10];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/client.c:100:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    int port = atoi(&s[1]);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/client.c:101:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char host[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/client.c:114:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&a.sin_addr, hp->h_addr, hp->h_length);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/client.c:129:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(a.sun_path, address, len);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/client.c:146:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[CPSIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:87:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char path[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:305:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char parent[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:328:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:335:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char buf2[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:389:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, dfn, dfnl);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:583:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *osave[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:675:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:696:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char   CWDdir[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:776:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(path, ucwd, ul);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:89:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char namebuf[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:95:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(namebuf, "/xpce-XXXXXX");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:97:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(namebuf, "/tmp/xpce-XXXXXX");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:99:20:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
    if ( (fileno = mkstemp(namebuf)) < 0 )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:129:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char namebuf[L_tmpnam];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:156:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ wchar_t expanded[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:163:6:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     wchar_t lng[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:164:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:334:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char path[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:347:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char path[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:391:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open(charArrayToFN((CharArray)f->name), access, mode);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:405:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[CPBUFSIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:459:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char bak[MAXPATHLEN*2];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:485:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fdfrom = open(old, O_RDONLY)) >= 0 &&
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:486:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	 (fdto   = open(new, O_WRONLY|O_CREAT|O_TRUNC, 0666)) >= 0 )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:487:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char buf[CPBUFSIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:547:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char path[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:610:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fdmode[3];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:655:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char cmd[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:932:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char dir[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:1077:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char c[4];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:1209:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t basebuf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:1242:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { wchar_t name[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:1243:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t bin[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c:458:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(e, ns->s_textA, ns->s_size);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c:460:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(e+ns->s_size+1, vs->s_textA, vs->s_size);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c:540:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char line[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c:544:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ( (master = open("/dev/ptmx", O_RDWR)) < 0 )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c:581:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ( (fd = open("/dev/tty", 2)) )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c:591:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	     (slave = open(line, O_RDWR)) < 0 )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c:968:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    { sprintf(line, "/dev/ptc/%d", n);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c:969:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ( (fd = open(line, 2)) >= 0 )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c:982:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(line, "/dev/pty");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c:995:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ( (fd = open(line, 2)) >= 0 )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c:1018:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char slave[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c:1032:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return open(slave, 2);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c:1045:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (ttyfd = open("/dev/tty", 0)) < 0 )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/socket.c:403:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(address->sun_path, path, *len);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/socket.c:432:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&address->sin_addr, hp->h_addr, hp->h_length);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/socket.c:660:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAX_UN_ADDRESS_LEN + sizeof(address->sun_family)];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/socket.c:682:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char aname[3*4+4];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/socket.c:691:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(aname, "%d.%d.%d.%d",
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/stream.c:178:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(q, data, len);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/stream.c:186:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[10];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/stream.c:203:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "<%d>", byte);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/stream.c:244:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  { memcpy((char *)s->input_buffer,
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/stream.c:313:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[BLOCKSIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/display.c:1550:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[10240];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/display.c:1572:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(s, ",\n");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/frame.c:757:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/frame.c:796:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf, "%dx%d", cw, ch);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/x11.c:73:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[256];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xcolour.c:43:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static char buf[200];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xcommon.c:73:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char msg[1024];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xcommon.c:74:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char request[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xcommon.c:75:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xcommon.c:84:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "%d", error->request_code);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xcommon.c:290:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char psmap[256];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xcommon.c:649:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[256];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xconvert.c:146:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hdr[64];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xconvert.c:288:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xconvert.c:290:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name_and_type[LINESIZE];		/* an input line */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xconvert.c:405:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hdr[256];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdisplay.c:182:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char host[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdisplay.c:228:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char problem[LINESIZE];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdisplay.c:232:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(problem, "no DISPLAY environment variable");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdisplay.c:236:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(problem, "No permission to contact X-server?");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdisplay.c:699:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[256];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdisplay.c:848:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, s->s_text, data);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdnd.c:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char b[20];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdnd.c:474:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (*descriptions + l, data, dcount);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdnd.c:816:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy (&xevent_temp, &xevent, sizeof (xevent));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdnd.c:1224:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (i->drop_data, data, length);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdnd.c:1234:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (t, i->drop_data, i->drop_data_length);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdnd.c:1235:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (t + i->drop_data_length, data, length);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdraw.c:2750:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ wchar_t s[1];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdraw.c:2785:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t s[1];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xevent.c:231:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[1024];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xfont.c:95:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  { char buf[1024];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xframe.c:515:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(i->drop_data, data, length);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xframe.c:525:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(t, i->drop_data, i->drop_data_length);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xframe.c:526:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(t + i->drop_data_length, data, length);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xframe.c:1123:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char signx[10], signy[10];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xframe.c:1129:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    { int n = atoi(e+1);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xjpeg.c:309:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  { char buf[1024];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xppm.c:941:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char c32[4];
data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/interface.c:1591:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(tmp, argv, argsallocated*sizeof(PceObject));
data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/interface.c:2883:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[2048];			/* No SP_vprintf() in SICStus */
data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/pcecall.c:197:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[50];
data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/pcecall.c:200:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "PceCallWin%d", (int)(intptr_t)context.hinstance);
data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/xpce-stub.c:61:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[1024];
data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/xpce-stub.c:75:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char *	argv[100];
data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/xpce-stub.c:325:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  { memcpy(&rc->data[rc->size], buffer, size);
data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/xpce-stub.c:328:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  { memcpy(rc->data, &buffer[size-rc->allocated], rc->allocated);
data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/xpce-stub.c:334:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&rc->data+leave, buffer, size);
data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/xpce-stub.c:361:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/xpce-stub.c:401:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char program[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/defatom.c:66:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
{ FILE *f1 = fopen(from, "r");
data/swi-prolog-8.2.3+dfsg/src/defatom.c:67:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f2 = fopen(to, "r");
data/swi-prolog-8.2.3+dfsg/src/defatom.c:71:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char l1[1024];
data/swi-prolog-8.2.3+dfsg/src/defatom.c:72:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char l2[1024];
data/swi-prolog-8.2.3+dfsg/src/defatom.c:114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/swi-prolog-8.2.3+dfsg/src/defatom.c:116:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char atom_defs[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/defatom.c:132:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  aic = fopen("pl-atom.ic.tmp", "w");
data/swi-prolog-8.2.3+dfsg/src/defatom.c:133:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  aih = fopen("pl-atom.ih.tmp", "w");
data/swi-prolog-8.2.3+dfsg/src/defatom.c:134:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fic = fopen("pl-funct.ic.tmp", "w");
data/swi-prolog-8.2.3+dfsg/src/defatom.c:135:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fih = fopen("pl-funct.ih.tmp", "w");
data/swi-prolog-8.2.3+dfsg/src/defatom.c:140:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  in = fopen(atom_defs, "r");
data/swi-prolog-8.2.3+dfsg/src/defatom.c:148:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { char id[256], str[256];
data/swi-prolog-8.2.3+dfsg/src/defatom.c:161:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { char id[256];
data/swi-prolog-8.2.3+dfsg/src/defatom.c:165:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ char name[300];
data/swi-prolog-8.2.3+dfsg/src/libtai/check.c:8:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char line[100];
data/swi-prolog-8.2.3+dfsg/src/libtai/check.c:10:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *dayname[7] = { "Sun", "Mon", "Tue", "Wed", "Thu", "Fri", "Sat" } ;
data/swi-prolog-8.2.3+dfsg/src/libtai/check.c:12:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char out[101];
data/swi-prolog-8.2.3+dfsg/src/libtai/check.c:13:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char x[TAI_PACK];
data/swi-prolog-8.2.3+dfsg/src/libtai/easter.c:5:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *dayname[7] = { "Sun", "Mon", "Tue", "Wed", "Thu", "Fri", "Sat" } ;
data/swi-prolog-8.2.3+dfsg/src/libtai/easter.c:7:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char out[101];
data/swi-prolog-8.2.3+dfsg/src/libtai/easter.c:18:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    cd.year = atoi(*argv);
data/swi-prolog-8.2.3+dfsg/src/libtai/leapsecs.c:11:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char line[100];
data/swi-prolog-8.2.3+dfsg/src/libtai/leapsecs.c:18:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char x[TAI_PACK];
data/swi-prolog-8.2.3+dfsg/src/libtai/leapsecs_read.c:31:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = open(file, O_RDONLY|O_NDELAY|O_BINARY);
data/swi-prolog-8.2.3+dfsg/src/libtai/nowutc.c:12:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char x[TAIA_FMTFRAC];
data/swi-prolog-8.2.3+dfsg/src/libtai/yearcal.c:30:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    year = atoi(*argv);
data/swi-prolog-8.2.3+dfsg/src/minizip/crypt.h:100:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char header[RAND_HEAD_LEN-2]; /* random header */
data/swi-prolog-8.2.3+dfsg/src/minizip/ioapi.c:21:38:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  #define FOPEN_FUNC(filename, mode) fopen(filename, mode)
data/swi-prolog-8.2.3+dfsg/src/minizip/ioapi.c:26:40:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    #define FOPEN_FUNC(filename, mode) fopen(filename, mode)
data/swi-prolog-8.2.3+dfsg/src/minizip/ioapi.c:34:40:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    #define FOPEN_FUNC(filename, mode) fopen(filename, mode)
data/swi-prolog-8.2.3+dfsg/src/minizip/ioapi.c:122:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        file = fopen(filename, mode_fopen);
data/swi-prolog-8.2.3+dfsg/src/minizip/iowin32.c:112:9:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        MultiByteToWideChar(CP_ACP,0,(const char*)filename,-1,filenameW,FILENAME_MAX + 0x200);
data/swi-prolog-8.2.3+dfsg/src/minizip/iowin32.c:137:9:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        MultiByteToWideChar(CP_ACP,0,(const char*)filename,-1,filenameW,FILENAME_MAX + 0x200);
data/swi-prolog-8.2.3+dfsg/src/minizip/iowin32.c:185:9:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        MultiByteToWideChar(CP_ACP,0,(const char*)filename,-1,filenameW,FILENAME_MAX + 0x200);
data/swi-prolog-8.2.3+dfsg/src/minizip/miniunz.c:32:36:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define FOPEN_FUNC(filename, mode) fopen(filename, mode)
data/swi-prolog-8.2.3+dfsg/src/minizip/miniunz.c:209:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char number[21];
data/swi-prolog-8.2.3+dfsg/src/minizip/miniunz.c:248:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char filename_inzip[256];
data/swi-prolog-8.2.3+dfsg/src/minizip/miniunz.c:318:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename_inzip[256];
data/swi-prolog-8.2.3+dfsg/src/minizip/miniunz.c:386:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char answer[128];
data/swi-prolog-8.2.3+dfsg/src/minizip/miniunz.c:541:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename_try[MAXFILENAME+16] = "";
data/swi-prolog-8.2.3+dfsg/src/minizip/miniunz.c:621:13:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
            strcat(filename_try,".zip");
data/swi-prolog-8.2.3+dfsg/src/minizip/minizip.c:33:36:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define FOPEN_FUNC(filename, mode) fopen(filename, mode)
data/swi-prolog-8.2.3+dfsg/src/minizip/minizip.c:110:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[MAXFILENAME+1];
data/swi-prolog-8.2.3+dfsg/src/minizip/minizip.c:255:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename_try[MAXFILENAME+16];
data/swi-prolog-8.2.3+dfsg/src/minizip/minizip.c:334:13:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
            strcat(filename_try,".zip");
data/swi-prolog-8.2.3+dfsg/src/minizip/minizip.c:349:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char answer[128];
data/swi-prolog-8.2.3+dfsg/src/minizip/mztools.c:38:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fpZip = fopen(file, "rb");
data/swi-prolog-8.2.3+dfsg/src/minizip/mztools.c:39:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fpOut = fopen(fileOut, "wb");
data/swi-prolog-8.2.3+dfsg/src/minizip/mztools.c:40:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fpOutCD = fopen(fileOutTmp, "wb");
data/swi-prolog-8.2.3+dfsg/src/minizip/mztools.c:44:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char header[30];
data/swi-prolog-8.2.3+dfsg/src/minizip/mztools.c:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[1024];
data/swi-prolog-8.2.3+dfsg/src/minizip/mztools.c:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char extra[1024];
data/swi-prolog-8.2.3+dfsg/src/minizip/mztools.c:149:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char header[46];
data/swi-prolog-8.2.3+dfsg/src/minizip/mztools.c:224:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char header[22];
data/swi-prolog-8.2.3+dfsg/src/minizip/mztools.c:257:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fpOutCD = fopen(fileOutTmp, "rb");
data/swi-prolog-8.2.3+dfsg/src/minizip/mztools.c:260:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[8192];
data/swi-prolog-8.2.3+dfsg/src/minizip/unzip.c:1301:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szCurrentFileName[UNZ_MAXFILENAMEINZIP+1];
data/swi-prolog-8.2.3+dfsg/src/minizip/unzip.c:1517:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char source[12];
data/swi-prolog-8.2.3+dfsg/src/minizip/zip.c:130:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char data[SIZEDATA_INDATABLOCK];
data/swi-prolog-8.2.3+dfsg/src/minizip/zip.c:299:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[8];
data/swi-prolog-8.2.3+dfsg/src/minizip/zip.c:1256:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char bufHead[RAND_HEAD_LEN];
data/swi-prolog-8.2.3+dfsg/src/minizip/zip.c:1990:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pTmp, p, dataSize + 4);
data/swi-prolog-8.2.3+dfsg/src/minizip/zip.c:2004:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pData, pNewHeader, size);
data/swi-prolog-8.2.3+dfsg/src/mkvmi.c:178:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
{ FILE *fd = fopen(file, "r");
data/swi-prolog-8.2.3+dfsg/src/mkvmi.c:181:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[1024];
data/swi-prolog-8.2.3+dfsg/src/mkvmi.c:226:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
{ FILE *f1 = fopen(from, "r");
data/swi-prolog-8.2.3+dfsg/src/mkvmi.c:227:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f2 = fopen(to, "r");
data/swi-prolog-8.2.3+dfsg/src/mkvmi.c:231:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char l1[1024];
data/swi-prolog-8.2.3+dfsg/src/mkvmi.c:232:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char l2[1024];
data/swi-prolog-8.2.3+dfsg/src/mkvmi.c:283:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *out = fopen(tmp, "w");
data/swi-prolog-8.2.3+dfsg/src/mkvmi.c:300:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char name[100];
data/swi-prolog-8.2.3+dfsg/src/mkvmi.c:321:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *out = fopen(tmp, "w");
data/swi-prolog-8.2.3+dfsg/src/mkvmi.c:352:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *out = fopen(tmp, "w");
data/swi-prolog-8.2.3+dfsg/src/mkvmi.c:383:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/SWI-Stream.h:358:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define fopen		Sopen_file
data/swi-prolog-8.2.3+dfsg/src/os/dtoa.c:596:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define Bcopy(x,y) memcpy((char *)&x->sign, (char *)&y->sign, \
data/swi-prolog-8.2.3+dfsg/src/os/dtoa.c:1487:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char hexdig[256];
data/swi-prolog-8.2.3+dfsg/src/os/pl-buffer.c:58:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new, b->static_buffer, osz);
data/swi-prolog-8.2.3+dfsg/src/os/pl-buffer.h:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		static_buffer[STATIC_BUFFER_SIZE];
data/swi-prolog-8.2.3+dfsg/src/os/pl-buffer.h:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		static_buffer[SMALL_STATIC_BUFFER_SIZE];
data/swi-prolog-8.2.3+dfsg/src/os/pl-buffer.h:61:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		static_buffer[sizeof(char *)];
data/swi-prolog-8.2.3+dfsg/src/os/pl-cstack.c:63:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char name[32];				/* function called */
data/swi-prolog-8.2.3+dfsg/src/os/pl-cstack.c:245:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char	      **retaddr[SAVE_TRACES];
data/swi-prolog-8.2.3+dfsg/src/os/pl-cstack.c:246:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char   *why[SAVE_TRACES];
data/swi-prolog-8.2.3+dfsg/src/os/pl-cstack.c:335:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(bt->retaddr[current], array, sizeof(void*)*frames);
data/swi-prolog-8.2.3+dfsg/src/os/pl-cstack.c:345:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char cmd[MAXCMD];
data/swi-prolog-8.2.3+dfsg/src/os/pl-cstack.c:397:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ char buf[512];
data/swi-prolog-8.2.3+dfsg/src/os/pl-cstack.c:507:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char name[MAX_FUNCTION_NAME_LENGTH];	/* function called */
data/swi-prolog-8.2.3+dfsg/src/os/pl-cstack.c:509:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char module[MAX_MODULE_NAME_LENGTH];	/* module of function */
data/swi-prolog-8.2.3+dfsg/src/os/pl-cstack.c:590:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char symbolScratch[sizeof(SYMBOL_INFO) + MAX_SYMBOL_LEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-cstack.c:763:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char dwarf_srclinebuf[MAX_PATH];
data/swi-prolog-8.2.3+dfsg/src/os/pl-cstack.c:878:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tbuf[48];
data/swi-prolog-8.2.3+dfsg/src/os/pl-cstack.c:1023:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tbuf[48];
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:2612:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(s->bufp, from, len);
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:2681:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[MAX_PENDING];
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:3729:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char   how[16];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:100:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t wfile[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:139:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:164:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:204:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:216:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:230:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:248:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:281:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:317:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:362:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:390:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:402:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char oldbuf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:403:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char newbuf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:588:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:589:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ospath[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:609:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:610:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ospath[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:735:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:755:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:843:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:858:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:1028:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:1044:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:1105:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:1172:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:1184:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { wchar_t lbuf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:1185:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:1229:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:110:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char buf[8];
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:450:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char buf[BUFSIZE];
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:527:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		  { char f[2];
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:562:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		  { char f[2];
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:592:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		    char grouping[2];
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:643:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		  char buf[BUFSIZE];
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:705:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	       { char buf[BUFSIZE];
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:757:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	        { char buf[BUFSIZE];
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:953:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { char buf[6];
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:1046:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tmp[256];
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:1199:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dp[20];  int dplen;
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:1200:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ddp[20]; int ddplen;
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:1213:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      { memcpy(e, dp, dplen);
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:1221:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(e, dp, dplen);
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:1249:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char ths[20];
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:1265:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(o, ths, thslen);
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:1366:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char tmp[12];
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:1583:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char tmp[12];
data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c:583:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char prefix[MAXPATHLEN];		/* before first pattern */
data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c:584:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char patbuf[MAXPATHLEN];		/* pattern buffer */
data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c:616:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    { char path[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c:674:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char path[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c:675:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c:698:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  { char newp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c:754:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char spec[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-locale.c:88:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ wchar_t buf[LSTR_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/pl-locale.c:621:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char s[MAX_GROUPING];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:196:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char errmsg[64];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:379:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
{ FILE *fd = fopen("/proc/cpuinfo", "r");
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:382:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[256];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:396:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	{ int cpu = atoi(vp+2);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:705:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char temp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:736:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t buf1[MAXPATHLEN], buf2[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:769:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fd=open(temp, O_CREAT|O_EXCL|O_WRONLY|O_BINARY, 0600)) < 0 )
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:982:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char envbuf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:985:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1143:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1170:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1183:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char parent[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1390:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1403:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  { memcpy(o, tmp, i-tmp);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1418:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char ls[10];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1455:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dirname[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1500:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char wordbuf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1518:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { char envbuf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1583:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ char envbuf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1720:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1721:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1782:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1824:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  { memcpy(cwd, GD->paths.CWDdir, GD->paths.CWDlen+1);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1941:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char ospath[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1942:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2439:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buf, s, l+1);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2732:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2733:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *argv[4];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2887:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2888:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2897:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2900:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (fd = open(file, O_RDONLY)) < 0 )
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2946:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { static char path[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:3013:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-prologflag.c:1631:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 { char envbuf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:235:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(newbuf, s->bufp, copy);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:834:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[16];
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:839:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "\\u%04X", c);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:841:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "\\U%08X", c);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:843:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf, "&#%d;", c);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:881:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char b[PL_MB_LEN_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:905:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char buf[6];
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:993:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char b[PL_MB_LEN_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:1035:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char b[1];
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:1204:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(s->buffer-safe, s->bufp, safe);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:1293:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	{ memcpy(buf, s->bufp, chars);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:1297:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	{ memcpy(buf, s->bufp, avail);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:1356:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&buf[done], s->bufp, n);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:2137:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[TMPBUFSIZE];
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:2162:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fbuf[100], *fs = fbuf, *fe = fbuf;
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:2235:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char fmbuf[8], *fp=fmbuf;
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:2254:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char fmbuf[8], *fp=fmbuf;
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:2312:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char fmbuf[8], *fp=fmbuf;
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:2686:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ char work[200];
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:2766:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ char set[256];
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:3203:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fd = open(path, O_WRONLY|O_CREAT|O_TRUNC|oflags, mode);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:3207:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fd = open(path, O_WRONLY|O_CREAT|O_APPEND|oflags, mode);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:3211:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fd = open(path, O_WRONLY|O_CREAT|oflags, mode);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:3215:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fd = open(path, O_RDONLY|oflags);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:3455:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char mode[2];
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:3549:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(nb, mf->buffer, mf->allocated);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:3563:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&mf->buffer[mf->here], buf, size);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:3588:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buf, &mf->buffer[mf->here], size);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.h:81:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	debugfd = fopen(f, "w");
data/swi-prolog-8.2.3+dfsg/src/os/pl-tai.c:63:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char *tzname[2];
data/swi-prolog-8.2.3+dfsg/src/os/pl-tai.c:578:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char key[3];
data/swi-prolog-8.2.3+dfsg/src/os/pl-tai.c:631:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ wchar_t wbuf[256];
data/swi-prolog-8.2.3+dfsg/src/os/pl-tai.c:707:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  { char fmt[3];
data/swi-prolog-8.2.3+dfsg/src/os/pl-tai.c:708:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char buf[256];
data/swi-prolog-8.2.3+dfsg/src/os/pl-tai.c:833:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    { char fmt[64];
data/swi-prolog-8.2.3+dfsg/src/os/pl-tai.c:834:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      char buf[64];
data/swi-prolog-8.2.3+dfsg/src/os/pl-tai.c:916:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    { char buf[26];
data/swi-prolog-8.2.3+dfsg/src/os/pl-text.c:85:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    { memcpy(new, text->text.t, bl);
data/swi-prolog-8.2.3+dfsg/src/os/pl-text.c:126:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      { memcpy(text->buf, text->text.t, bl);
data/swi-prolog-8.2.3+dfsg/src/os/pl-text.c:147:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char tmpBuf[INT64_DIGITS + 1];
data/swi-prolog-8.2.3+dfsg/src/os/pl-text.c:160:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(out, ptr, nbDigs);
data/swi-prolog-8.2.3+dfsg/src/os/pl-text.c:703:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { unsigned char buf[sizeof(text->buf)];
data/swi-prolog-8.2.3+dfsg/src/os/pl-text.c:708:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buf, text->buf, text->length*sizeof(char));
data/swi-prolog-8.2.3+dfsg/src/os/pl-text.c:765:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buf, text->buf, text->length*sizeof(pl_wchar_t));
data/swi-prolog-8.2.3+dfsg/src/os/pl-text.c:822:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char b[PL_MB_LEN_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/pl-text.c:843:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char b[6];
data/swi-prolog-8.2.3+dfsg/src/os/pl-text.c:935:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char msg[128];
data/swi-prolog-8.2.3+dfsg/src/os/pl-text.c:1175:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char b2[sizeof(text->buf)];
data/swi-prolog-8.2.3+dfsg/src/os/pl-text.c:1180:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      { memcpy(b2, text->buf, sizeof(text->buf));
data/swi-prolog-8.2.3+dfsg/src/os/pl-text.c:1414:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    { memcpy(to, text[i]->text.t, text[i]->length);
data/swi-prolog-8.2.3+dfsg/src/os/pl-text.c:1432:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      { memcpy(to, text[i]->text.w, text[i]->length*sizeof(pl_wchar_t));
data/swi-prolog-8.2.3+dfsg/src/os/pl-text.c:1435:50:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { const unsigned char *f = (const unsigned char *)text[i]->text.t;
data/swi-prolog-8.2.3+dfsg/src/os/pl-text.h:59:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[100];			/* buffer for simple stuff */
data/swi-prolog-8.2.3+dfsg/src/os/windows/dirent.h:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char			d_name[DIRENT_MAX+1];
data/swi-prolog-8.2.3+dfsg/src/os/windows/dwarf-debug.c:22:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                 atoi((char*)section->Name + 1));
data/swi-prolog-8.2.3+dfsg/src/os/windows/popen.c:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char Args[4096];
data/swi-prolog-8.2.3+dfsg/src/os/windows/popen.c:79:2:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	strcat(Args, " /c ");
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:134:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char o[6];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:204:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static char home[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:208:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { TCHAR h[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:218:7:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { TCHAR d[100];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:219:7:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      TCHAR p[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:220:7:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      TCHAR tmp[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:232:2:  [2] (buffer) _tcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant string.
	_tcscat(tmp, _T("\\"));
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:239:2:  [2] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
	_tcscpy(&tmp[1], _T(":\\"));
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:325:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:376:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:387:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:476:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:487:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR in[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:488:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR out[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:502:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:504:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR abs[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:521:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { TCHAR osp1[PATH_MAX], osp2[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:522:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR abs1[PATH_MAX], abs2[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:576:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR buf[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:624:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:625:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR m[MAX_FOPEN_FLAGS];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:660:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:661:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sd_buf[512];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:785:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:796:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:807:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:818:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR osold[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:819:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR osnew[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:835:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:869:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:884:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:896:3:  [2] (buffer) _tcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant string.
  _tcscat(buf, _T("\\*.*"));
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:970:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:990:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:1001:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:1012:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf0[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:1013:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR buf1[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:1030:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR nm[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:1031:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR val[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:1066:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR nm[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:1067:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR buf[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.h:63:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#undef open
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.h:80:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define open _xos_open
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.h:96:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define fopen(p, m) _xos_fopen(p, m)
data/swi-prolog-8.2.3+dfsg/src/pentium.c:65:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  { FILE *fp = fopen("/proc/cpuinfo", "r");
data/swi-prolog-8.2.3+dfsg/src/pentium.c:66:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/swi-prolog-8.2.3+dfsg/src/pl-alloc.c:928:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(q, s, len);
data/swi-prolog-8.2.3+dfsg/src/pl-alloc.c:968:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&w[1], s, len*sizeof(pl_wchar_t));
data/swi-prolog-8.2.3+dfsg/src/pl-alloc.c:1048:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, &d, sizeof(d));
data/swi-prolog-8.2.3+dfsg/src/pl-alloc.c:1508:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(nw, mem, copy-SA_OFFSET);
data/swi-prolog-8.2.3+dfsg/src/pl-alloc.c:1528:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  { memcpy(ra, mem, reg->size-SA_OFFSET);
data/swi-prolog-8.2.3+dfsg/src/pl-alloc.c:1609:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  { memcpy(mem, old, (size>osize?osize:size));
data/swi-prolog-8.2.3+dfsg/src/pl-arith.c:3854:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fd=open(dev, O_RDONLY)) != -1 )
data/swi-prolog-8.2.3+dfsg/src/pl-arith.c:3858:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char seedarray[RAND_SEED_LEN];
data/swi-prolog-8.2.3+dfsg/src/pl-arith.c:4421:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(new, old, half);
data/swi-prolog-8.2.3+dfsg/src/pl-assert.c:80:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tbuf[48];
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:595:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(a->name, s, length);
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:600:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(a->name, s, length);
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:1235:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char fmt[100];
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:1239:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(fmt, "OOPS: PL_unregister_atom('%Ls'): -1 references\n");
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:1930:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[LINESIZ];
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:1931:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmm[LINESIZ];
data/swi-prolog-8.2.3+dfsg/src/pl-attvar.c:125:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  { char buf[32];
data/swi-prolog-8.2.3+dfsg/src/pl-attvar.c:138:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  { char buf[32];
data/swi-prolog-8.2.3+dfsg/src/pl-attvar.c:175:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ char buf[32]; char buf2[32];
data/swi-prolog-8.2.3+dfsg/src/pl-attvar.c:175:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ char buf[32]; char buf2[32];
data/swi-prolog-8.2.3+dfsg/src/pl-attvar.c:246:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  DEBUG(0, char buf[256];
data/swi-prolog-8.2.3+dfsg/src/pl-attvar.c:1214:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ char buf[64];
data/swi-prolog-8.2.3+dfsg/src/pl-attvar.c:1215:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  char vname[32];
data/swi-prolog-8.2.3+dfsg/src/pl-attvar.c:1233:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    { char buf[64];
data/swi-prolog-8.2.3+dfsg/src/pl-attvar.c:1244:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ char buf1[64]; char buf2[64];
data/swi-prolog-8.2.3+dfsg/src/pl-attvar.c:1244:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ char buf1[64]; char buf2[64];
data/swi-prolog-8.2.3+dfsg/src/pl-attvar.c:1280:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      { char buf1[64]; char buf2[64];
data/swi-prolog-8.2.3+dfsg/src/pl-attvar.c:1280:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      { char buf1[64]; char buf2[64];
data/swi-prolog-8.2.3+dfsg/src/pl-bag.c:67:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		first_data[FIRST_CHUNK_SIZE];
data/swi-prolog-8.2.3+dfsg/src/pl-comp.c:1760:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cl, &clause, sizeofClause(0));
data/swi-prolog-8.2.3+dfsg/src/pl-comp.c:1761:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cl->codes, baseBuffer(&ci.codes, code), sizeOfBuffer(&ci.codes));
data/swi-prolog-8.2.3+dfsg/src/pl-comp.c:1800:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cl, &clause, sizeofClause(0));
data/swi-prolog-8.2.3+dfsg/src/pl-comp.c:1801:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(cl->codes, baseBuffer(&ci.codes, code), sizeOfBuffer(&ci.codes));
data/swi-prolog-8.2.3+dfsg/src/pl-comp.c:2183:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ char vname[32];
data/swi-prolog-8.2.3+dfsg/src/pl-comp.c:6631:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(cl, &clause, sizeofClause(0));
data/swi-prolog-8.2.3+dfsg/src/pl-comp.c:6633:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(cl->codes, baseBuffer(&ci.codes, code), sizeOfBuffer(&ci.codes));
data/swi-prolog-8.2.3+dfsg/src/pl-cont.c:132:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[128];
data/swi-prolog-8.2.3+dfsg/src/pl-copyterm.c:741:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(indirects, ip, sz*sizeof(word));
data/swi-prolog-8.2.3+dfsg/src/pl-copyterm.c:788:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(o, fht->data, fht->data_len*sizeof(word));
data/swi-prolog-8.2.3+dfsg/src/pl-data.h:311:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define isBString(w)	(isString(w) && ((char *)valIndirectP(w))[0] == 'B')
data/swi-prolog-8.2.3+dfsg/src/pl-data.h:312:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define isWString(w)	(isString(w) && ((char *)valIndirectP(w))[0] == 'W')
data/swi-prolog-8.2.3+dfsg/src/pl-dde.c:106:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ wchar_t buf[FASTBUFSIZE];
data/swi-prolog-8.2.3+dfsg/src/pl-debug.c:286:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char buf[MAX_TOPIC_LEN];
data/swi-prolog-8.2.3+dfsg/src/pl-dict.c:1012:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(c_tmp, fields_start, (PC-fields_start)*sizeof(code));
data/swi-prolog-8.2.3+dfsg/src/pl-dict.c:1016:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(fs, c_tmp+kv_pos[f].start, len);
data/swi-prolog-8.2.3+dfsg/src/pl-dwim.c:123:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char sw1a[1024], sw1b[1024];
data/swi-prolog-8.2.3+dfsg/src/pl-dwim.c:124:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sw2a[1024], sw2b[1024];
data/swi-prolog-8.2.3+dfsg/src/pl-error.c:104:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msgbuf[50];
data/swi-prolog-8.2.3+dfsg/src/pl-ext.c:209:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char str[256];
data/swi-prolog-8.2.3+dfsg/src/pl-ext.c:246:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(m, str, len);
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:1400:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(*s, r, len+1);
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:2941:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char tmp[1];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:139:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char tmp[256];				/* for calling print_val(), etc. */
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:164:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			  DEBUG(3, char b[64]; Sdprintf("\tdomarked(%p = %s)\n", p, print_val(*p, b))); \
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:289:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char tmp[256];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:319:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char tmp[256];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:337:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  { strcpy(o, "VAR");
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:344:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(o+10, "...");
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:394:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char buf1[256];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:395:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf2[256];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:418:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { char buf1[64];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:426:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { char buf1[64];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:451:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char buf1[64];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:832:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char b[64];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:1510:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char b1[64]; char b2[64]; char b3[64];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:1510:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char b1[64]; char b2[64]; char b3[64];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:1510:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char b1[64]; char b2[64]; char b3[64];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:1526:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      char b1[64]; char b2[64]; char b3[64];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:1526:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      char b1[64]; char b2[64]; char b3[64];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:1526:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      char b1[64]; char b2[64]; char b3[64];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:1554:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      char b1[64]; char b2[64];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:1554:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      char b1[64]; char b2[64];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:2105:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[128];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:2966:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { DEBUG(MSG_GC_SWEEP, char b[64];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:3083:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { char buf1[64];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:3084:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf2[64];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:3781:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char pbuf[256];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:3782:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char vbuf[256];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:3807:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ char b1[64], b2[64];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:3980:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ char b1[64], b2[64], b3[64];
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:4933:21:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        increment = atol(incr);
data/swi-prolog-8.2.3+dfsg/src/pl-gmp.c:272:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, mpz->_mp_d, size);
data/swi-prolog-8.2.3+dfsg/src/pl-gmp.c:325:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, num->_mp_d, num_size);
data/swi-prolog-8.2.3+dfsg/src/pl-gmp.c:328:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, den->_mp_d, den_size);
data/swi-prolog-8.2.3+dfsg/src/pl-gmp.c:372:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&n->value.i, p, sizeof(int64_t));
data/swi-prolog-8.2.3+dfsg/src/pl-gmp.c:397:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&n->value.i, p, sizeof(int64_t));
data/swi-prolog-8.2.3+dfsg/src/pl-gmp.c:928:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	  { char buf[256];
data/swi-prolog-8.2.3+dfsg/src/pl-gmp.c:980:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ char buf[256];
data/swi-prolog-8.2.3+dfsg/src/pl-incl.h:1422:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		argtype[4];	/* Argument type(s) code takes */
data/swi-prolog-8.2.3+dfsg/src/pl-incl.h:1704:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		buffer[1];		/* array holding codes */
data/swi-prolog-8.2.3+dfsg/src/pl-incl.h:2237:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		buffer[1024];		/* fast temporary buffer */
data/swi-prolog-8.2.3+dfsg/src/pl-index.c:376:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *
data/swi-prolog-8.2.3+dfsg/src/pl-index.c:378:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static char sbuf[64];
data/swi-prolog-8.2.3+dfsg/src/pl-index.c:2140:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(as->assessments, as->buf, sizeof(as->buf));
data/swi-prolog-8.2.3+dfsg/src/pl-index.c:2410:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char nvcomp[MAXINDEXARG];
data/swi-prolog-8.2.3+dfsg/src/pl-index.c:2645:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(hints->args, nbest->args, sizeof(nbest->args));
data/swi-prolog-8.2.3+dfsg/src/pl-indirect.c:314:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(h->data, &idata[1], isize*sizeof(word));
data/swi-prolog-8.2.3+dfsg/src/pl-indirect.c:385:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p, h->data, wsize*sizeof(word));
data/swi-prolog-8.2.3+dfsg/src/pl-indirect.c:410:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, h->data, wsize*sizeof(word));
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:99:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char exec_vars[512] = EXECVARMAGIC;
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:229:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char envbuf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:230:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char plp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:262:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:263:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char parent[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:282:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { char buf2[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:289:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ char buf2[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:332:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char plp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:336:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[256];
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:354:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char fb[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:411:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char envbuf[4];
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:432:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char plp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:435:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char plp1[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:465:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:866:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:867:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char plp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:908:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  { strcat(exedir, "/swipl.prc");
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:963:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      { char wb[6];
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:976:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(abuf, baseBuffer(&b, char), sz);
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:1175:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:1577:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tbuf[48];
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:1648:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tbuf[48];
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:1659:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char msg[500];
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:1699:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char message[LINESIZ];
data/swi-prolog-8.2.3+dfsg/src/pl-load.c:306:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char symname[MAXSYMBOLLEN+1];
data/swi-prolog-8.2.3+dfsg/src/pl-modul.c:1245:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[256];
data/swi-prolog-8.2.3+dfsg/src/pl-nt.c:137:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[1024];
data/swi-prolog-8.2.3+dfsg/src/pl-nt.c:330:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t wbuf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-nt.c:422:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(wcmd, cmd, len*sizeof(wchar_t));
data/swi-prolog-8.2.3+dfsg/src/pl-nt.c:597:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-nt.c:900:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ wchar_t buf[MAX_PATH];
data/swi-prolog-8.2.3+dfsg/src/pl-nt.c:986:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { wchar_t buf[256];
data/swi-prolog-8.2.3+dfsg/src/pl-nt.c:1040:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t wchars[MAXREGSTRLEN/sizeof(wchar_t)];
data/swi-prolog-8.2.3+dfsg/src/pl-ntconsole.c:70:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t buffer[ANSI_BUFFER_SIZE];
data/swi-prolog-8.2.3+dfsg/src/pl-ntconsole.c:87:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[1024];
data/swi-prolog-8.2.3+dfsg/src/pl-ntmain.c:235:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[sizeof(TCHAR)];		/* Pad to TCHAR */
data/swi-prolog-8.2.3+dfsg/src/pl-ntmain.c:238:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, buffer+n, i);
data/swi-prolog-8.2.3+dfsg/src/pl-ntmain.c:580:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[256];
data/swi-prolog-8.2.3+dfsg/src/pl-ntmain.c:814:10:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static TCHAR winclassname[32];
data/swi-prolog-8.2.3+dfsg/src/pl-ntmain.c:967:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR title[256];
data/swi-prolog-8.2.3+dfsg/src/pl-ntmain.c:968:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR wtag[64];
data/swi-prolog-8.2.3+dfsg/src/pl-ntmain.c:1114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[6];
data/swi-prolog-8.2.3+dfsg/src/pl-ntmain.c:1128:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char *av[MAX_ARGC+1];
data/swi-prolog-8.2.3+dfsg/src/pl-op.c:73:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ unsigned char	type[3];
data/swi-prolog-8.2.3+dfsg/src/pl-prims.c:4038:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t buf[256];
data/swi-prolog-8.2.3+dfsg/src/pl-prims.c:4242:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp, baseBuffer(b, char), len);
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:484:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[100];
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:564:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char buf[100];
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2101:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char s[1024];
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:3796:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(copy, cl, size);
data/swi-prolog-8.2.3+dfsg/src/pl-prof.c:92:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[100];
data/swi-prolog-8.2.3+dfsg/src/pl-prof.c:981:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static char buf[100];
data/swi-prolog-8.2.3+dfsg/src/pl-read.c:304:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char fast[FASTBUFFERSIZE];	/* Quick internal buffer */
data/swi-prolog-8.2.3+dfsg/src/pl-read.c:843:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rb.base, rb.fast, FASTBUFFERSIZE);
data/swi-prolog-8.2.3+dfsg/src/pl-read.c:874:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[10];
data/swi-prolog-8.2.3+dfsg/src/pl-read.c:1037:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char what[2];
data/swi-prolog-8.2.3+dfsg/src/pl-read.c:1150:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		strcpy((char *)rb.base, "end_of_file. ");
data/swi-prolog-8.2.3+dfsg/src/pl-read.c:1309:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    base = atoi((char*)bs);
data/swi-prolog-8.2.3+dfsg/src/pl-read.c:1735:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { const char *singletons[MAX_SINGLETONS];
data/swi-prolog-8.2.3+dfsg/src/pl-read.c:2366:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	{ char tmp[2];
data/swi-prolog-8.2.3+dfsg/src/pl-read.c:2394:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[6];
data/swi-prolog-8.2.3+dfsg/src/pl-read.c:5080:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[1024];
data/swi-prolog-8.2.3+dfsg/src/pl-read.c:5171:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[256];
data/swi-prolog-8.2.3+dfsg/src/pl-read.c:5183:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ns, s, len);
data/swi-prolog-8.2.3+dfsg/src/pl-rec.c:275:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(b->top, ptr, bytes);
data/swi-prolog-8.2.3+dfsg/src/pl-rec.c:729:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(addPointer(record, rsize), info.code.base, sizeOfBuffer(&info.code));
data/swi-prolog-8.2.3+dfsg/src/pl-rec.c:745:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	   memcpy(r1, r2, r1->size) == 0
data/swi-prolog-8.2.3+dfsg/src/pl-rec.c:886:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      { memcpy(rec, data.info.code.base, scode);
data/swi-prolog-8.2.3+dfsg/src/pl-rec.c:903:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      { memcpy(rec, data.hdr.base, shdr);
data/swi-prolog-8.2.3+dfsg/src/pl-rec.c:904:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rec+shdr, data.info.code.base, scode);
data/swi-prolog-8.2.3+dfsg/src/pl-rec.c:957:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(q,      data.hdr.base,       shdr);
data/swi-prolog-8.2.3+dfsg/src/pl-rec.c:958:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(q+shdr, data.info.code.base, scode);
data/swi-prolog-8.2.3+dfsg/src/pl-rec.c:1058:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  { memcpy(nrec, rec, hdr);
data/swi-prolog-8.2.3+dfsg/src/pl-rec.c:1079:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char fast[FASTRW_FAST];
data/swi-prolog-8.2.3+dfsg/src/pl-rec.c:1224:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		{ memcpy(var, (b)->data, sizeof(type)); \
data/swi-prolog-8.2.3+dfsg/src/pl-rec.c:1229:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		{ memcpy(var, (b)->data, times*sizeof(type)); \
data/swi-prolog-8.2.3+dfsg/src/pl-rec.c:2110:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(newstate, state, sizeof(*state));
data/swi-prolog-8.2.3+dfsg/src/pl-segstack.c:60:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  { memcpy(stack->top, data, stack->unit_size);
data/swi-prolog-8.2.3+dfsg/src/pl-segstack.c:88:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(CHUNK_DATA(chunk), data, stack->unit_size);
data/swi-prolog-8.2.3+dfsg/src/pl-segstack.c:122:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(data, stack->top, stack->unit_size);
data/swi-prolog-8.2.3+dfsg/src/pl-setup.c:335:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[12];
data/swi-prolog-8.2.3+dfsg/src/pl-string.c:62:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[6];
data/swi-prolog-8.2.3+dfsg/src/pl-supervisor.c:329:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
{ memcpy(dest, src, count*sizeof(code));
data/swi-prolog-8.2.3+dfsg/src/pl-sys.c:66:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[1024];
data/swi-prolog-8.2.3+dfsg/src/pl-tabling.c:2563:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(gk, keys, bytes);
data/swi-prolog-8.2.3+dfsg/src/pl-term.c:121:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char term[100];
data/swi-prolog-8.2.3+dfsg/src/pl-termhash.c:359:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char	  buf[HASH_BLOCK_SIZE];
data/swi-prolog-8.2.3+dfsg/src/pl-termhash.c:371:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  { memcpy(&state->buf[state->len], data, len);
data/swi-prolog-8.2.3+dfsg/src/pl-termhash.c:379:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&state->buf[state->len], data, copy);
data/swi-prolog-8.2.3+dfsg/src/pl-termhash.c:589:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { unsigned char sha1[SHA1_DIGEST_SIZE];
data/swi-prolog-8.2.3+dfsg/src/pl-termhash.c:590:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hex[SHA1_DIGEST_SIZE*2];
data/swi-prolog-8.2.3+dfsg/src/pl-termhash.c:780:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(v, ctx->hash, 5 * sizeof(uint32_t));
data/swi-prolog-8.2.3+dfsg/src/pl-termhash.c:854:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(((unsigned char*)ctx->wbuf) + pos, sp, space);
data/swi-prolog-8.2.3+dfsg/src/pl-termhash.c:860:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(((unsigned char*)ctx->wbuf) + pos, sp, len);
data/swi-prolog-8.2.3+dfsg/src/pl-termwalk.c:59:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		first_chunk[256];
data/swi-prolog-8.2.3+dfsg/src/pl-termwalk.c:155:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		first_chunk[64*sizeof(acNode)];
data/swi-prolog-8.2.3+dfsg/src/pl-termwalk.c:240:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		first_chunk[sizeof(segchunk)+sizeof(aNode_P)*64];
data/swi-prolog-8.2.3+dfsg/src/pl-termwalk.c:320:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		first_chunk[256];
data/swi-prolog-8.2.3+dfsg/src/pl-termwalk.c:397:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		first_chunk[256];
data/swi-prolog-8.2.3+dfsg/src/pl-termwalk.c:480:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char		first_chunk[sizeof(aNodeLRS)*25];
data/swi-prolog-8.2.3+dfsg/src/pl-thread.c:1345:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(newinfo, oldinfo, dsize);
data/swi-prolog-8.2.3+dfsg/src/pl-thread.c:1631:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[16];
data/swi-prolog-8.2.3+dfsg/src/pl-thread.c:1644:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(tmp, "%d", id);
data/swi-prolog-8.2.3+dfsg/src/pl-thread.c:1690:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[16];
data/swi-prolog-8.2.3+dfsg/src/pl-thread.c:5933:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char fname[256];
data/swi-prolog-8.2.3+dfsg/src/pl-thread.c:5936:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fname, "/proc/self/task/%d/stat", tid);
data/swi-prolog-8.2.3+dfsg/src/pl-thread.c:5937:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fd=open(fname, O_RDONLY)) >= 0 )
data/swi-prolog-8.2.3+dfsg/src/pl-thread.c:5938:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buffer[1000];
data/swi-prolog-8.2.3+dfsg/src/pl-thread.c:5990:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buffer[1000];
data/swi-prolog-8.2.3+dfsg/src/pl-thread.c:6395:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(local->impl.any.args, def->impl.any.args, bytes);
data/swi-prolog-8.2.3+dfsg/src/pl-trace.c:474:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[LINESIZ];
data/swi-prolog-8.2.3+dfsg/src/pl-trace.c:932:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[3];
data/swi-prolog-8.2.3+dfsg/src/pl-trace.c:1064:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[256];
data/swi-prolog-8.2.3+dfsg/src/pl-trie.c:830:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[64];
data/swi-prolog-8.2.3+dfsg/src/pl-trie.c:873:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(keys, fast, sizeof(fast));
data/swi-prolog-8.2.3+dfsg/src/pl-trie.c:1581:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(state->vars, state->var_buf, sizeof(*state->vars)*NVARS_FAST);
data/swi-prolog-8.2.3+dfsg/src/pl-trie.c:1692:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    { char b1[64]; char b2[64];
data/swi-prolog-8.2.3+dfsg/src/pl-trie.c:1692:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    { char b1[64]; char b2[64];
data/swi-prolog-8.2.3+dfsg/src/pl-trie.c:2240:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(nchp->base, ochp->base, bytes);
data/swi-prolog-8.2.3+dfsg/src/pl-trie.c:2903:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(cl->codes, baseBuffer(&state->codes, code), sizeOfBuffer(&state->codes));
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:17:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x00[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:52:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x01[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:87:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x02[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:122:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x03[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:157:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x04[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:192:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x05[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:227:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x06[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:262:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x07[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:297:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x08[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:332:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x09[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:367:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x0a[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:402:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x0b[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:437:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x0c[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:472:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x0d[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:507:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x0e[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:542:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x0f[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:577:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x10[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:612:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x12[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:647:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x13[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:682:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x14[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:717:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x16[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:752:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x17[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:787:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x18[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:822:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x19[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:857:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1a[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:892:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1b[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:927:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1c[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:962:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1d[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:997:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1e[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1032:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1f[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1067:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x20[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1102:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x21[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1137:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x23[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1172:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x24[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1207:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x27[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1242:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x2b[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1277:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x2c[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1312:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x2d[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1347:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x2e[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1382:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x2f[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1417:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x30[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1452:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x31[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1487:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x32[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1522:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x4d[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1557:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x9f[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1592:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0xa4[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1627:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0xa6[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1662:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0xa7[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1697:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0xa8[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1732:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0xa9[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1767:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0xaa[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1802:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0xab[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1837:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0xd7[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1872:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0xd8[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1907:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0xdb[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1942:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0xdc[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:1977:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0xdf[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2012:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0xe0[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2047:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0xf8[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2082:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0xfa[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2117:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0xfb[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2152:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0xfd[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2187:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0xfe[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2222:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0xff[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2257:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x100[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2292:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x101[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2327:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x102[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2362:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x103[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2397:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x104[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2432:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x108[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2467:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x109[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2502:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x10a[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2537:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x10b[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2572:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x10c[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2607:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x10e[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2642:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x110[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2677:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x111[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2712:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x116[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2747:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x123[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2782:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x124[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2817:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x134[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2852:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x16a[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2887:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x16f[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2922:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1b0[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2957:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1d0[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:2992:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1d1[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3027:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1d2[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3062:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1d3[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3097:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1d4[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3132:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1d5[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3167:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1d6[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3202:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1d7[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3237:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1ee[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3272:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1f0[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3307:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1f1[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3342:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1f2[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3377:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1f3[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3412:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1f4[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3447:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1f5[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3482:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1f6[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3517:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1f7[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3552:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x2a6[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3587:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x2b7[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3622:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x2b8[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3657:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x2fa[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3692:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0xe00[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3727:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0xe01[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3762:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0xf00[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3797:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0xfff[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3832:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x1000[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-umap.c:3867:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char ucp0x10ff[256] =
data/swi-prolog-8.2.3+dfsg/src/pl-util.c:84:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[6];
data/swi-prolog-8.2.3+dfsg/src/pl-util.c:136:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char tmp[650];
data/swi-prolog-8.2.3+dfsg/src/pl-util.c:146:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(e, "(nil)");
data/swi-prolog-8.2.3+dfsg/src/pl-util.c:161:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char tmp[650];
data/swi-prolog-8.2.3+dfsg/src/pl-util.c:183:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char tmp[650];
data/swi-prolog-8.2.3+dfsg/src/pl-util.c:186:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    { strcpy(tmp, "<nil>");
data/swi-prolog-8.2.3+dfsg/src/pl-util.c:203:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	      strcpy(tmp, "<number>");
data/swi-prolog-8.2.3+dfsg/src/pl-util.c:225:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char tmp[650];
data/swi-prolog-8.2.3+dfsg/src/pl-util.c:234:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char tmp[256];
data/swi-prolog-8.2.3+dfsg/src/pl-wam.c:113:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char last[20];
data/swi-prolog-8.2.3+dfsg/src/pl-wam.c:2232:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buf[256];
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:487:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[1024];
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:1148:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char fast[1024];
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:1398:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		{ const char ca1_float[2] = {CA1_FLOAT};
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:1399:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		  const char ca1_int64[2] = {CA1_INT64};
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:1601:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(clause, bcl, csize);
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:1661:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:2511:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fast[1024];
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:2977:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char message[LINESIZ];
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:3167:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:3222:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mbuf[100];
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:3249:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char load[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:3250:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char save[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:3357:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:4006:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-write.c:168:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[32];			/* Max is H354745078340568300 */
data/swi-prolog-8.2.3+dfsg/src/pl-write.c:511:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char esc[8];
data/swi-prolog-8.2.3+dfsg/src/pl-write.c:587:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[32];
data/swi-prolog-8.2.3+dfsg/src/pl-write.c:936:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(buf, "NaN");
data/swi-prolog-8.2.3+dfsg/src/pl-write.c:964:12:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return strcpy(buf, "-1.0Inf");
data/swi-prolog-8.2.3+dfsg/src/pl-write.c:966:12:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    return strcpy(buf, "1.0Inf");
data/swi-prolog-8.2.3+dfsg/src/pl-write.c:1046:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      { memcpy(o, s+1, end-s-1);
data/swi-prolog-8.2.3+dfsg/src/pl-write.c:1050:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(o, "e%d", decpt-1);
data/swi-prolog-8.2.3+dfsg/src/pl-write.c:1058:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(o, s, end-s);
data/swi-prolog-8.2.3+dfsg/src/pl-write.c:1062:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  { memcpy(o, s, decpt);
data/swi-prolog-8.2.3+dfsg/src/pl-write.c:1065:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(o, s+decpt, end-s-decpt);
data/swi-prolog-8.2.3+dfsg/src/pl-write.c:1076:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(o, s+1, end-s-1);
data/swi-prolog-8.2.3+dfsg/src/pl-write.c:1080:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(o, "e+%d", trailing);
data/swi-prolog-8.2.3+dfsg/src/pl-write.c:1082:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    { memcpy(o, s, end-s);
data/swi-prolog-8.2.3+dfsg/src/pl-write.c:1101:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char tmp[1024];
data/swi-prolog-8.2.3+dfsg/src/pl-write.c:1136:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char buf[32];
data/swi-prolog-8.2.3+dfsg/src/pl-write.c:1157:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char buf[100];
data/swi-prolog-8.2.3+dfsg/src/pl-write.c:1174:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[32];
data/swi-prolog-8.2.3+dfsg/src/pl-write.c:2258:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[100];
data/swi-prolog-8.2.3+dfsg/src/pl-xterm.c:218:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *xterm_argv[MAXARGV];
data/swi-prolog-8.2.3+dfsg/src/pl-xterm.c:244:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (master = open("/dev/ptmx", O_RDWR)) < 0 )
data/swi-prolog-8.2.3+dfsg/src/pl-xterm.c:257:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  slave = open(slavename, O_RDWR);
data/swi-prolog-8.2.3+dfsg/src/pl-xterm.c:272:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char arg[64];
data/swi-prolog-8.2.3+dfsg/src/pl-xterm.c:274:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-xterm.c:283:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(arg, "-S%c%c%d", cc[0], cc[1], master);
data/swi-prolog-8.2.3+dfsg/src/pl-zip.c:218:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char modes[8];
data/swi-prolog-8.2.3+dfsg/src/pl-zip.c:223:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(m, "m444");
data/swi-prolog-8.2.3+dfsg/src/pl-zip.c:340:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buf, mem->here, copy);
data/swi-prolog-8.2.3+dfsg/src/pl-zip.c:1066:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fname[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/pl-zip.c:1067:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char extra[1024];
data/swi-prolog-8.2.3+dfsg/src/pl-zip.c:1068:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char comment[1024];
data/swi-prolog-8.2.3+dfsg/src/pl-zip.c:1146:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ( (fd = open(name, O_RDONLY)) >= 0 )
data/swi-prolog-8.2.3+dfsg/src/pl-zip.c:1171:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t buf[PATH_MAX];
data/swi-prolog-8.2.3+dfsg/src/pl-zip.c:1273:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    { memcpy(r, &z, sizeof(*r));
data/swi-prolog-8.2.3+dfsg/src/pl-zip.c:1288:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    { memcpy(r, &z, sizeof(*r));
data/swi-prolog-8.2.3+dfsg/src/pl-zip.c:1320:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  { memcpy(r, &z, sizeof(*r));
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:413:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  return memcpy(r, in, len);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:453:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[1024];
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:503:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char *argv[256];
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:514:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[1024];
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:976:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:995:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[MAXPATHLEN+16];
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1008:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char tmp[1024];
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1082:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cmd[512];
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1089:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char buf[1024];
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1092:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char name[100];
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1093:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char value[1024];
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1205:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char cmd[10240];
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1234:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char ofile[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1297:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char tmp[10240];
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1301:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(tmp, "LIB=");
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1330:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1359:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { char buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1372:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char soname[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1386:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1413:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  { char tmp[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1486:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[1024];
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1490:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(buf, "consult([");
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1504:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(e, "]),qsave_program(");
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1508:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(e, ",[");
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1519:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(e, "])");
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1538:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char buf[CPBUFSIZE];
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1564:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char ibuf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1565:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char obuf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1600:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  { if ( (ofd = open(out, O_WRONLY|O_BINARY, 0666)) < 0 )
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1608:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ( (ifd = open(pltmp, O_RDONLY|O_BINARY)) < 0 )
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:183:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char	_rlc_word_chars[CHAR_MAX]; /* word-characters (selection) */
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:307:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:356:10:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static TCHAR winclassname[32];
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:403:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR *	    argv[100];
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:405:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR		    program[MAXPATHLEN];
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:406:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR		    progbase[100];
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:570:10:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static TCHAR winclassname[32];
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:751:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR Prog[256];
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:1913:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR text[MAXLINE];
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:2221:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR tmp[MAXLINE];
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:3815:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[1024];
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:3827:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[1024];
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:3832:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, tl->text, tl->size);
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.h:84:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR		face_name[32];		/* font name */
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.h:218:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR		candidate[COMPLETE_MAX_WORD_LEN];
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.h:219:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR		buf_handle[COMPLETE_MAX_WORD_LEN];
data/swi-prolog-8.2.3+dfsg/src/win32/console/console_i.h:143:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR		current_title[RLC_TITLE_MAX]; /* window title */
data/swi-prolog-8.2.3+dfsg/src/win32/console/console_i.h:150:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR	        output_queue[OQSIZE];	/* The output queue */
data/swi-prolog-8.2.3+dfsg/src/win32/console/console_i.h:163:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR		promptbuf[MAXPROMPT];	/* Buffer for building prompt */
data/swi-prolog-8.2.3+dfsg/src/win32/console/console_i.h:164:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR		prompt[MAXPROMPT];	/* The prompt */
data/swi-prolog-8.2.3+dfsg/src/win32/console/edit.c:440:7:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { TCHAR match[COMPLETE_MAX_WORD_LEN];
data/swi-prolog-8.2.3+dfsg/src/win32/console/edit.c:480:7:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    { TCHAR *buf[COMPLETE_MAX_MATCHES];
data/swi-prolog-8.2.3+dfsg/src/win32/console/edit.c:680:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char  keys[4];
data/swi-prolog-8.2.3+dfsg/src/win32/console/menu.c:168:7:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      TCHAR nbuf[MAXLABELLEN];
data/swi-prolog-8.2.3+dfsg/src/win32/console/registry.c:41:8:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static TCHAR _rlc_regbase[MAXKEYPATHLEN] = TEXT("current_user/PrologConsole");
data/swi-prolog-8.2.3+dfsg/src/win32/console/registry.c:45:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[MAXKEYLEN];
data/swi-prolog-8.2.3+dfsg/src/win32/console/registry.c:77:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ TCHAR buf[MAXKEYLEN];
data/swi-prolog-8.2.3+dfsg/man/calc.c:21:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    e += strlen(e);
data/swi-prolog-8.2.3+dfsg/packages/PDT/pdt_console.c:127:38:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    { rc = (*c->org_input_functions->read)(handle, buf, 2);
data/swi-prolog-8.2.3+dfsg/packages/PDT/pdt_console.c:134:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return (*c->org_input_functions->read)(handle, buf, size);
data/swi-prolog-8.2.3+dfsg/packages/PDT/pdt_console.c:199:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    assert(in->functions->read != pdt_read);
data/swi-prolog-8.2.3+dfsg/packages/archive/archive4pl.c:1337:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  MKATOM(read);
data/swi-prolog-8.2.3+dfsg/packages/bdb/bdb4pl.c:1658:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  if ( !(config[nconf] = malloc(strlen(n)+strlen(v)+2)) )
data/swi-prolog-8.2.3+dfsg/packages/bdb/bdb4pl.c:1658:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  if ( !(config[nconf] = malloc(strlen(n)+strlen(v)+2)) )
data/swi-prolog-8.2.3+dfsg/packages/bdb/bdb4pl.c:1663:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	  strcat(config[nconf], " ");
data/swi-prolog-8.2.3+dfsg/packages/clib/crypt.c:93:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      { strncpy(salt, e+3, slen);
data/swi-prolog-8.2.3+dfsg/packages/clib/form.c:135:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	end = eq+strlen(eq);		/* end of the string */
data/swi-prolog-8.2.3+dfsg/packages/clib/form.c:176:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ size_t blen = strlen(boundary);
data/swi-prolog-8.2.3+dfsg/packages/clib/form.c:199:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nlen = strlen(name);
data/swi-prolog-8.2.3+dfsg/packages/clib/form.c:308:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( !(func)(name, strlen(name), data, end-data, filename, closure) )
data/swi-prolog-8.2.3+dfsg/packages/clib/form.c:367:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while( (done=read(fileno(stdin), q, len)) > 0 )
data/swi-prolog-8.2.3+dfsg/packages/clib/form.c:393:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      *lenp = strlen(s);
data/swi-prolog-8.2.3+dfsg/packages/clib/md5passwd.c:75:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if(!strncmp(sp,magic,strlen(magic)))
data/swi-prolog-8.2.3+dfsg/packages/clib/md5passwd.c:76:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sp += strlen(magic);
data/swi-prolog-8.2.3+dfsg/packages/clib/md5passwd.c:88:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	MD5Update(&ctx,pw,strlen(pw));
data/swi-prolog-8.2.3+dfsg/packages/clib/md5passwd.c:91:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	MD5Update(&ctx,magic,strlen(magic));
data/swi-prolog-8.2.3+dfsg/packages/clib/md5passwd.c:98:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	MD5Update(&ctx1,pw,strlen(pw));
data/swi-prolog-8.2.3+dfsg/packages/clib/md5passwd.c:100:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	MD5Update(&ctx1,pw,strlen(pw));
data/swi-prolog-8.2.3+dfsg/packages/clib/md5passwd.c:102:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for(pl = strlen(pw); pl > 0; )
data/swi-prolog-8.2.3+dfsg/packages/clib/md5passwd.c:114:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (j=0,i = strlen(pw); i ; i >>= 1)
data/swi-prolog-8.2.3+dfsg/packages/clib/md5passwd.c:122:2:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
	strncat(passwd,sp,sl);
data/swi-prolog-8.2.3+dfsg/packages/clib/md5passwd.c:123:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(passwd,"$");
data/swi-prolog-8.2.3+dfsg/packages/clib/md5passwd.c:135:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			MD5Update(&ctx1,pw,strlen(pw));
data/swi-prolog-8.2.3+dfsg/packages/clib/md5passwd.c:143:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			MD5Update(&ctx1,pw,strlen(pw));
data/swi-prolog-8.2.3+dfsg/packages/clib/md5passwd.c:148:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			MD5Update(&ctx1,pw,strlen(pw));
data/swi-prolog-8.2.3+dfsg/packages/clib/md5passwd.c:152:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	p = passwd + strlen(passwd);
data/swi-prolog-8.2.3+dfsg/packages/clib/memfile.c:1479:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  MKATOM(read);
data/swi-prolog-8.2.3+dfsg/packages/clib/nonblockio.c:245:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  dest += strlen(dest);
data/swi-prolog-8.2.3+dfsg/packages/clib/nonblockio.c:951:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		      dev, strlen(dev)) == 0 )
data/swi-prolog-8.2.3+dfsg/packages/clib/process.c:284:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ for(; *env; env += strlen(env)+1)
data/swi-prolog-8.2.3+dfsg/packages/clib/process.c:348:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { add_ecbuf(eb, *e, strlen(*e));
data/swi-prolog-8.2.3+dfsg/packages/clib/process.c:363:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    q += strlen(q)+1;
data/swi-prolog-8.2.3+dfsg/packages/clib/process.c:518:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( !(info->argv[0] = PL_malloc(strlen(info->exe)+1)) )
data/swi-prolog-8.2.3+dfsg/packages/clib/process.c:618:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return (*Sfilefunctions.read)((void*)(uintptr_t)fd, buf, size);
data/swi-prolog-8.2.3+dfsg/packages/clib/process.c:813:17:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    av[0].len = wcslen(av[0].text);
data/swi-prolog-8.2.3+dfsg/packages/clib/process.c:824:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if ( wcslen(av[i].text) != av[i].len )
data/swi-prolog-8.2.3+dfsg/packages/clib/process.c:839:7:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      wcsncpy(o, s, av[i].len);
data/swi-prolog-8.2.3+dfsg/packages/clib/socket.c:594:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nmlen = strlen(file_name_chars);
data/swi-prolog-8.2.3+dfsg/packages/clib/unix.c:294:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      s = *e + strlen(*e);
data/swi-prolog-8.2.3+dfsg/packages/clib/unix.c:299:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(name, *e, len);
data/swi-prolog-8.2.3+dfsg/packages/clib/uri.c:420:5:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  { wcsncpy(cb->here, s, len);
data/swi-prolog-8.2.3+dfsg/packages/cpp/SWI-cpp.h:80:49:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { functor = PL_new_functor(PL_new_atom_wchars(wcslen(name), name), arity);
data/swi-prolog-8.2.3+dfsg/packages/cpp/SWI-cpp.h:97:33:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { handle = PL_new_atom_wchars(wcslen(text), text);
data/swi-prolog-8.2.3+dfsg/packages/cpp/SWI-cpp.h:1043:40:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    PL_new_functor(PL_new_atom_wchars(wcslen(functor), functor),
data/swi-prolog-8.2.3+dfsg/packages/cpp/SWI-cpp.h:1208:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { size_t len = strlen(msg)+1;
data/swi-prolog-8.2.3+dfsg/packages/cpp/SWI-cpp.h:1214:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(message, msg, len);
data/swi-prolog-8.2.3+dfsg/packages/http/stream_range.c:58:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  size_t	    read;		/* data already read */
data/swi-prolog-8.2.3+dfsg/packages/http/stream_range.c:104:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ( ctx->size - ctx->read < size )
data/swi-prolog-8.2.3+dfsg/packages/http/stream_range.c:105:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    max_rd = ctx->size - ctx->read;
data/swi-prolog-8.2.3+dfsg/packages/http/stream_range.c:156:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    size_t left = ctx->size - ctx->read;
data/swi-prolog-8.2.3+dfsg/packages/jpl/src/main/c/jpl.c:1847:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { cpoptp = (char *)malloc(strlen(classpath) + 20);
data/swi-prolog-8.2.3+dfsg/packages/jpl/src/main/c/jpl.c:3111:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    argv[i] = (char *)malloc(strlen(cp) + 1);
data/swi-prolog-8.2.3+dfsg/packages/jpl/src/main/c/jpl.c:4867:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      jvm_dia[i] = (char *)malloc(strlen(s) + 1);
data/swi-prolog-8.2.3+dfsg/packages/libedit/libedit4pl.c:538:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  rc = read(fd, buf, size);
data/swi-prolog-8.2.3+dfsg/packages/libedit/libedit4pl.c:723:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ size_t linelen = strlen(line);
data/swi-prolog-8.2.3+dfsg/packages/libedit/libedit4pl.c:760:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      rval = read(fd, buf, size);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/psfile.c:43:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ int ls = strlen(sub);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/psfile.c:44:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int l = strlen(in) - ls;
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:393:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = getc(fd->stream.fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:454:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#undef getc
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:457:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define getc(fd) mygetc(fd)
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:485:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ char *cp = malloc(strlen(s)+1);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:821:7:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:827:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:840:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
{ int c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:845:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:852:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    { c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:866:10:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:899:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
{ int c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:906:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    { c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:953:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
{ int c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:957:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:971:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:975:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1007:7:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1015:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1020:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1023:6:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1033:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { g.arguments[n] = alloca(strlen(abuf)+1);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1039:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      g.arguments[n] = alloca(strlen(abuf)+1);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1043:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      g.arguments[n] = alloca(strlen(abuf)+1);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1072:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  el = strlen(end);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1078:12:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    *s++ = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1128:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  enl = strlen(ename);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1147:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { e.arguments[n] = alloca(strlen(abuf)+1);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1153:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      e.arguments[n] = alloca(strlen(abuf)+1);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1186:15:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int delim = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1187:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1195:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1242:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
{ int c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1257:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  { c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1268:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1288:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  { c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1302:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1312:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1343:6:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1355:24:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	(*func)(&t, ctx); c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1366:6:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1372:6:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1378:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	{ c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1382:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1404:6:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1415:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  c = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1636:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { if ( isalnum(g->command->name[strlen(g->command->name)-1]) )
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:1723:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   (int)strlen(t->value.string) + pp->line_pos > pp->right_margin )
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:2592:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   (int)strlen(t->value.string) + pp->line_pos > pp->right_margin )
data/swi-prolog-8.2.3+dfsg/packages/ltx2htm/tex.c:2734:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(argstart, texarg, 50);
data/swi-prolog-8.2.3+dfsg/packages/nlp/double_metaphone.c:69:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s->length  = strlen(init_str);
data/swi-prolog-8.2.3+dfsg/packages/nlp/double_metaphone.c:219:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    add_length = (int)strlen(new_str);
data/swi-prolog-8.2.3+dfsg/packages/nlp/double_metaphone.c:245:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length  = (int)strlen(str);
data/swi-prolog-8.2.3+dfsg/packages/nlp/isub.c:88:18:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t n = MIN(wcslen(s1), wcslen(s2));
data/swi-prolog-8.2.3+dfsg/packages/nlp/isub.c:88:30:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t n = MIN(wcslen(s1), wcslen(s2));
data/swi-prolog-8.2.3+dfsg/packages/nlp/isub.c:119:13:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l1 = (int)wcslen(s1);	// length of s
data/swi-prolog-8.2.3+dfsg/packages/nlp/isub.c:120:13:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l2 = (int)wcslen(s2);	// length of t
data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/examples/stemwords.c:23:18:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        int ch = getc(f_in);
data/swi-prolog-8.2.3+dfsg/packages/nlp/libstemmer_c/examples/stemwords.c:47:22:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                ch = getc(f_in);
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:3499:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l = strlen(s);			/* return from snprintf() is not */
data/swi-prolog-8.2.3+dfsg/packages/odbc/odbc.c:4629:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( otz && strlen(otz) < 10 )	/* avoid buffer overflow */
data/swi-prolog-8.2.3+dfsg/packages/pcre/pcre4pl.c:689:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( strlen(pats) != len )		/* TBD: escape as \0xx */
data/swi-prolog-8.2.3+dfsg/packages/readline/readline4pl.c:448:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      rval = read(fd, buf, size);
data/swi-prolog-8.2.3+dfsg/packages/readline/readline4pl.c:476:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	PL_add_to_protocol(prompt, strlen(prompt));
data/swi-prolog-8.2.3+dfsg/packages/readline/readline4pl.c:508:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { size_t l = strlen(line);
data/swi-prolog-8.2.3+dfsg/packages/readline/readline4pl.c:559:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { char *copy = malloc(1 + strlen(s));
data/swi-prolog-8.2.3+dfsg/packages/readline/readline4pl.c:585:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#undef read				/* UXNT redefinition */
data/swi-prolog-8.2.3+dfsg/packages/semweb/rdf_db.c:257:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  { if ( strlen(s) == len )
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:111:27:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ wchar_t *copy = malloc((wcslen(in)+1)*sizeof(wchar_t));
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:543:16:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ size_t len = wcslen(name);
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:891:16:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ size_t len = wcslen(iri);
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:1052:19:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { size_t plen = wcslen(prefix_iri);
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:1053:19:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t llen = wcslen(local);
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:1101:9:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = wcslen(uri);
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:1123:5:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    wcsncpy(name, ts->base_uri, plen);
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:1323:22:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ts->base_uri_len = wcslen(ts->base_uri);
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:1414:37:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	r->v.r.handle = PL_new_atom_wchars(wcslen(r->v.r.name), r->v.r.name);
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:1420:18:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	{ size_t plen = wcslen(ts->bnode.prefix);
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:1482:43:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    { cg->v.r.handle = PL_new_atom_wchars(wcslen(cg->v.r.name), cg->v.r.name);
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:3390:22:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			      PL_NWCHARS, wcslen(c->name), c->name,
data/swi-prolog-8.2.3+dfsg/packages/semweb/turtle.c:3391:22:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			      PL_NWCHARS, wcslen(c->value.s), c->value.s) )
data/swi-prolog-8.2.3+dfsg/packages/semweb/xsd.c:114:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(in);
data/swi-prolog-8.2.3+dfsg/packages/semweb/xsd.c:157:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l1 = strlen((const char*)s1);
data/swi-prolog-8.2.3+dfsg/packages/semweb/xsd.c:158:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l2 = strlen((const char*)s2);
data/swi-prolog-8.2.3+dfsg/packages/sgml/catalog.c:346:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  { c = getc(src);
data/swi-prolog-8.2.3+dfsg/packages/sgml/catalog.c:353:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    { c = getc(src);
data/swi-prolog-8.2.3+dfsg/packages/sgml/catalog.c:359:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      { c = getc(src);
data/swi-prolog-8.2.3+dfsg/packages/sgml/catalog.c:363:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	{ c = getc(src);
data/swi-prolog-8.2.3+dfsg/packages/sgml/catalog.c:375:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      { c = getc(src);
data/swi-prolog-8.2.3+dfsg/packages/sgml/catalog.c:399:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    c = getc(src);
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:477:16:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { end = in + wcslen(in);
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:1373:19:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	e->length = (int)wcslen(e->value);
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5373:19:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while( (chr = getc(fd)) != EOF )
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5426:14:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ( (p0 = getc(fd)) == EOF )
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5428:14:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ( (p1 = getc(fd)) == EOF )
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5434:14:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  { int p2 = getc(fd);
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5501:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      s += wcslen(s);
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5515:10:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s += wcslen(s);
data/swi-prolog-8.2.3+dfsg/packages/sgml/parser.c:5547:8:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  s += wcslen(s);
data/swi-prolog-8.2.3+dfsg/packages/sgml/prolog.c:103:13:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ int len = wcslen(text);
data/swi-prolog-8.2.3+dfsg/packages/sgml/quote.c:144:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ size_t len = strlen(s);
data/swi-prolog-8.2.3+dfsg/packages/sgml/quote.c:159:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ size_t len = strlen(s);
data/swi-prolog-8.2.3+dfsg/packages/sgml/sgml.c:279:30:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  wprint_escaped(stdout, pi, wcslen(pi));
data/swi-prolog-8.2.3+dfsg/packages/sgml/sgml.c:417:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(doctype, argv[0], ext - argv[0]);
data/swi-prolog-8.2.3+dfsg/packages/sgml/sgml2pl.c:1129:19:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			   PL_NWCHARS, wcslen(l->name.file), l->name.file,
data/swi-prolog-8.2.3+dfsg/packages/sgml/sgml2pl.c:1499:9:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			     wcslen(error->plain_message),
data/swi-prolog-8.2.3+dfsg/packages/sgml/sgml2pl.c:1562:23:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			       PL_NWCHARS, wcslen(error->plain_message),
data/swi-prolog-8.2.3+dfsg/packages/sgml/sgml2pl.c:1664:18:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			  PL_NWCHARS, wcslen(pi), pi) )
data/swi-prolog-8.2.3+dfsg/packages/sgml/sgml2pl.c:2655:43:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  return PL_unify_wchars(value, PL_ATOM, wcslen(e->value), e->value);
data/swi-prolog-8.2.3+dfsg/packages/sgml/sgml2pl.c:2672:34:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	 PL_unify_wchars(head, PL_ATOM, wcslen(n->name->name), n->name->name) )
data/swi-prolog-8.2.3+dfsg/packages/sgml/util.c:535:30:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       !(copy = sgml_malloc((wcslen(in)+1)*sizeof(wchar_t))) )
data/swi-prolog-8.2.3+dfsg/packages/sgml/util.c:578:14:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = wcslen(s);
data/swi-prolog-8.2.3+dfsg/packages/sgml/util.c:583:3:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  wcsncpy(buf, s, len-5);
data/swi-prolog-8.2.3+dfsg/packages/sgml/util.c:593:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ size_t sl = strlen(in);
data/swi-prolog-8.2.3+dfsg/packages/sgml/util.c:707:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  if ( (n=(int)read(fd, s, (unsigned int)len)) < 0 )
data/swi-prolog-8.2.3+dfsg/packages/sgml/util.h:129:23:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define istrlen(s1)   wcslen((s1))
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:76:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( strlen(s) == len )			/* no 0-characters */
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:173:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  memmove(&s[0], &s[-exp_shift], strlen(&s[-exp_shift])+1);
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:187:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  memmove(&e[0], &e[1], strlen(&e[1])+1);
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:191:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { e = &buf[strlen(buf)];
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:573:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    e = s+strlen(s);
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:720:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      { strcat(buf, "Z");
data/swi-prolog-8.2.3+dfsg/packages/sgml/xsd.c:724:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *out = buf+strlen(buf);
data/swi-prolog-8.2.3+dfsg/packages/ssl/crypto4pl.c:361:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       context->hmac_key, strlen(context->hmac_key),
data/swi-prolog-8.2.3+dfsg/packages/ssl/crypto4pl.c:414:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       out->hmac_key, strlen(out->hmac_key),
data/swi-prolog-8.2.3+dfsg/packages/ssl/crypto4pl.c:1434:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { rc = PL_unify_chars(tout, PL_STRING|REP_ISO_LATIN_1, strlen(hex), hex);
data/swi-prolog-8.2.3+dfsg/packages/ssl/crypto4pl.c:1473:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { rc = PL_unify_chars(tprime, PL_STRING|REP_ISO_LATIN_1, strlen(hex), hex);
data/swi-prolog-8.2.3+dfsg/packages/ssl/crypto4pl.c:1671:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { rc = PL_unify_chars(torder, PL_STRING|REP_ISO_LATIN_1, strlen(hex), hex);
data/swi-prolog-8.2.3+dfsg/packages/ssl/crypto4pl.c:1709:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { rc = PL_unify_chars(tx, PL_STRING|REP_ISO_LATIN_1, strlen(xhex), xhex)
data/swi-prolog-8.2.3+dfsg/packages/ssl/crypto4pl.c:1710:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      && PL_unify_chars(ty, PL_STRING|REP_ISO_LATIN_1, strlen(yhex), yhex);
data/swi-prolog-8.2.3+dfsg/packages/ssl/crypto4pl.c:1756:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { rc = PL_unify_chars(ta, PL_STRING|REP_ISO_LATIN_1, strlen(ahex), ahex)
data/swi-prolog-8.2.3+dfsg/packages/ssl/crypto4pl.c:1757:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      && PL_unify_chars(tb, PL_STRING|REP_ISO_LATIN_1, strlen(bhex), bhex);
data/swi-prolog-8.2.3+dfsg/packages/ssl/cryptolib.c:94:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (s != NULL && (new = malloc(strlen(s)+1)) != NULL) {
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:1315:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { return PL_unify_chars(Field, PL_ATOM|REP_UTF8, strlen(salgorithm), salgorithm);
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:1642:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( PL_unify_chars(av+2, PL_ATOM|REP_UTF8, strlen(host), host)
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:2117:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              if (hostlen == strlen(config->host) &&
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:2121:85:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              } else if (hostlen > 2 && hostname[0] == '*' && hostname[1] == '.' && strlen(hostname) == hostlen)
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:2147:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              { if (ASN1_STRING_length(common_name_asn1) == strlen(config->host) &&
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:2296:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { if ( (len = (int)strlen(passwd)) < size )
data/swi-prolog-8.2.3+dfsg/packages/ssl/ssl4pl.c:4277:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		       strlen(cipher), (unsigned char*)cipher) )
data/swi-prolog-8.2.3+dfsg/packages/swipl-win/SwiPrologEngine.cpp:80:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strcpy(this->argv[a] = new char[strlen(argv[a]) + 1], argv[a]);
data/swi-prolog-8.2.3+dfsg/packages/swipl-win/pqConsole.cpp:129:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            v = p.read(o).toBool() ? A("true") : A("false");
data/swi-prolog-8.2.3+dfsg/packages/swipl-win/pqConsole.cpp:135:46:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                if (CCP key = e.valueToKey(p.read(o).toInt())) {
data/swi-prolog-8.2.3+dfsg/packages/swipl-win/pqConsole.cpp:140:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            v = long(p.read(o).toInt());
data/swi-prolog-8.2.3+dfsg/packages/swipl-win/pqConsole.cpp:143:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            v = long(p.read(o).toUInt());
data/swi-prolog-8.2.3+dfsg/packages/swipl-win/pqConsole.cpp:146:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            v = A(p.read(o).toString());
data/swi-prolog-8.2.3+dfsg/packages/table/error.c:79:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return strcpy((char *)malloc(strlen(msg)+1), msg);
data/swi-prolog-8.2.3+dfsg/packages/table/table.c:1277:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  { strncpy(to, from, len);
data/swi-prolog-8.2.3+dfsg/packages/table/table.c:1307:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(tmp);
data/swi-prolog-8.2.3+dfsg/packages/table/table.c:1985:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	      qf->value.s = malloc(strlen(tmp)+1);
data/swi-prolog-8.2.3+dfsg/packages/table/table.c:1989:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    qf->length = strlen(qf->value.s);
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:214:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	int attrlen = strlen(str) + 1;
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:1201:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(req_tlv.name, a, TIPC_MAX_BEARER_NAME - 1);
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:1218:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(bearer_name, bname, TIPC_MAX_BEARER_NAME - 1);
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:1268:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(addr_area);
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:1298:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(link_name, args, TIPC_MAX_LINK_NAME - 1);
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:1319:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(link_name, args, TIPC_MAX_LINK_NAME - 1);
data/swi-prolog-8.2.3+dfsg/packages/tipc/tipcutils/tipc-config.c:1336:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(link_name, args, TIPC_MAX_LINK_NAME - 1);
data/swi-prolog-8.2.3+dfsg/packages/utf8proc/utf8proc.c:120:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const uint8_t *str, ssize_t strlen, int32_t *dst
data/swi-prolog-8.2.3+dfsg/packages/utf8proc/utf8proc.c:126:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!strlen) return 0;
data/swi-prolog-8.2.3+dfsg/packages/utf8proc/utf8proc.c:129:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen >= 0 && length > strlen) return UTF8PROC_ERROR_INVALIDUTF8;
data/swi-prolog-8.2.3+dfsg/packages/utf8proc/utf8proc.c:129:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen >= 0 && length > strlen) return UTF8PROC_ERROR_INVALIDUTF8;
data/swi-prolog-8.2.3+dfsg/packages/utf8proc/utf8proc.c:359:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const uint8_t *str, ssize_t strlen,
data/swi-prolog-8.2.3+dfsg/packages/utf8proc/utf8proc.c:383:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (rpos >= strlen) break;
data/swi-prolog-8.2.3+dfsg/packages/utf8proc/utf8proc.c:536:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const uint8_t *str, ssize_t strlen, uint8_t **dstptr, int options
data/swi-prolog-8.2.3+dfsg/packages/utf8proc/utf8proc.c:541:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  result = utf8proc_decompose(str, strlen, NULL, 0, options);
data/swi-prolog-8.2.3+dfsg/packages/utf8proc/utf8proc.c:545:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  result = utf8proc_decompose(str, strlen, buffer, result, options);
data/swi-prolog-8.2.3+dfsg/packages/utf8proc/utf8proc.h:247:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
ssize_t utf8proc_iterate(const uint8_t *str, ssize_t strlen, int32_t *dst);
data/swi-prolog-8.2.3+dfsg/packages/utf8proc/utf8proc.h:312:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const uint8_t *str, ssize_t strlen,
data/swi-prolog-8.2.3+dfsg/packages/utf8proc/utf8proc.h:353:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const uint8_t *str, ssize_t strlen, uint8_t **dstptr, int options
data/swi-prolog-8.2.3+dfsg/packages/windows/plregtry.c:519:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  s += strlen(s) + 1;
data/swi-prolog-8.2.3+dfsg/packages/windows/plregtry.c:555:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen((char*)data) + 1;
data/swi-prolog-8.2.3+dfsg/packages/windows/plregtry.c:595:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen((char*)data) + 1;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/date.c:421:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  strncat(date, s, 3);			/* dayname */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/date.c:423:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  strncat(date, s+8, 2);		/* day */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/date.c:424:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  strncat(date, s+3, 5);		/* Month */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/date.c:425:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  strncat(date, s+20, 4);		/* year */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/date.c:426:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  strncat(date, s+10, 9);		/* time */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/date.c:428:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(date, " ");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/date.c:704:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( otz && strlen(otz) < 10 )	/* avoid buffer overflow */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/adt/real.c:122:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { char *end, *es = s + strlen(s);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/find_names.c:82:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/find_names.c:101:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(nbuf, start, s-start);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gnu/getdate.c:1308:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	      size += strlen(yytname[x]) + 15, count++;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gnu/getdate.c:1323:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
			strcat(msg, "'");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gnu/getdate.c:1692:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen (buff) == 3)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gnu/getdate.c:1694:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  else if (strlen (buff) == 4 && buff[3] == '.')
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gnu/getdate.c:1737:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = (int)strlen (buff) - 1;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/colour.c:226:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t l = strlen(s);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/gra/postscript.c:994:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  { strncpy(name, r, q-r);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/kernel.h:103:8:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#undef getchar
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/kernel.h:1388:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
NewClass(equal)				/* == */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/stream.h:166:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
{ Sread_function	read;		/* fill the buffer */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/stream.h:320:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#undef getc
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/stream.h:322:8:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#undef getchar
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/stream.h:334:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define	getc		Sgetc
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/stream.h:336:9:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define	fgetc		Sgetc
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/stream.h:343:9:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define getchar		Sgetchar
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/h/types.h:89:16:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
typedef struct equal *			Equal;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/gifread.c:114:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( (GIFErrorText = pceMalloc(strlen(fmt)+1)) )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/gifread.c:161:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(version, (char *) (buf + 3), 3);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/gifwrite.c:253:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( (comment && strlen(comment) > (size_t) 0) || mask )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/gifwrite.c:288:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (comment && strlen(comment) > (size_t) 0) {   /* write comment blocks */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/img/gifwrite.c:296:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while ( (blen=strlen(sp)) > 0) {
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/itf/interface.c:132:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    str_set_n_ascii(&s, strlen(text), (char *)text);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/alloc.c:413:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  t = alloc(strlen(s) + 1);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/alloc.c:422:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ unalloc(strlen(s)+1, s);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/class.c:1293:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l = strlen(buf);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/class.c:1324:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( strlen(doc) > 0 )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/class.c:1345:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( strlen(doc) > 0 )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/classvar.c:410:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  StringObj  s = (doc && strlen(doc) > 0 ? CtoString(doc) : DEFAULT);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/classvar.c:712:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  e = s+strlen(s);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/classvar.c:801:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    l = (int)strlen(s);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/classvar.c:810:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(buf, localbuf, size);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/classvar.c:816:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(&buf[size], s, l);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:191:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ char *q = pceMalloc(strlen(s)+1);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:258:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      { strncpy(&summary[1], charArrayToUTF8(ca), 25);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/conversion.c:263:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(summary, "\"");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:430:8:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf[l=wcslen(buf)] = tolower(c + '@');
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:437:15:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        buf[l=wcslen(buf)] = c;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/goodies.c:442:24:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return WCToName(buf, wcslen(buf));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/name.c:238:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    name->data.s_size = (int)strlen((char *)name->data.s_text);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/name.c:300:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	        name->data.size, strlen(strName(name)),
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/name.c:598:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { CharBuf(buf, strlen(s));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/save.c:239:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  str_set_n_ascii(&magic, strlen(SaveMagic), SaveMagic);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/save.c:710:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ls = (long)strlen(SaveMagic);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/self.c:1189:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(v, s, q-s);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/ker/type.c:1172:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ cucharp  ts = (cucharp)(suff + strlen(suff) - 1);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/slider.c:164:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(buf, "]");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/men/slider.c:217:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(buf, "]");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mscolour.c:105:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    for(e = s + strlen(s); e > s && e[-1] <= ' '; e--)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mscolour.c:177:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    for(e = s + strlen(s); e > s && e[-1] <= ' '; e--)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msdisplay.c:447:27:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    q = copy = pceMalloc((wcslen(data)+1)*sizeof(wchar_t));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msdisplay.c:464:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    q = copy = pceMalloc(strlen(data));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msdraw.c:2931:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(buf, (char*)s->s_textA, n);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msframe.c:57:19:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ size_t bytes = (_tcslen(in)+1)*sizeof(TCHAR);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msmetafile.c:502:28:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    descr = alloca((slen + wcslen(app) + 3)*sizeof(wchar_t));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msmetafile.c:507:10:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s += wcslen(app) + 1;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msprinter.c:211:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    HGLOBAL h = GlobalAlloc(GMEM_MOVEABLE, sizeof(DEVNAMES)+strlen(s)+1);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/msprocess.c:149:11:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	       { strcat(cmdline, " ");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswin.c:44:37:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define TCHARToName(s)  WCToName(s, _tcslen(s))
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswin.c:369:15:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	{ size_t l = _tcslen(q); \
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswin.c:503:10:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( _tcslen(fn) >= sizeof(buffer) )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswin.c:562:18:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      pattern += _tcslen(pattern)+1;	/* first pattern */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswin.c:564:20:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { pattern += _tcslen(pattern)+1;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/msw/mswin.c:565:13:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pattern += _tcslen(pattern)+1;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regc_locale.c:636:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(cn->name)==len && strncmpAW(cn->name, startp, len)==0) {
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regc_locale.c:822:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ((strlen(*namePtr) == len) && (strncmpAW(*namePtr, startp, len) == 0)) {
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regerror.c:101:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(msg) + 1;		/* space needed, including NUL */
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regerror.c:106:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(errbuf, msg, errbuf_size-1);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regfronts.c:53:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(str);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/regfronts.c:79:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(str);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/test.c:13:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ size_t len = strlen(in);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/test.c:68:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( (rc=re_compileA(&re, argv[1], strlen(argv[1]), REG_ADVANCED)) != REG_OKAY )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/test.c:74:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( (rc = re_execA(&re, argv[2], strlen(argv[2]),
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/test.c:87:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( (rc=re_compileW(&re, mkwide(argv[1]), strlen(argv[1]), REG_BOSONLY|REG_ADVANCED)) != REG_OKAY )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/rgx/test.c:103:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( (rc = re_execW(&re, target, strlen(argv[2]),
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/chararray.c:788:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(s);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/i18n.c:299:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  e = in + strlen((const char*)in);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/i18n.c:412:13:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = wcslen(wc);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/regex.c:691:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  LocalArray(char, tmp, strlen(s)*2+2);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/str.c:163:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ size_t len = strlen(text);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/str.c:172:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const char *e = &text[strlen(s)];
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/str.c:206:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ size_t len = strlen(text);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/textbuffer.c:1137:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      for(here += strlen(qq_start); here < to; here++)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/textbuffer.c:1141:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	{ here += strlen(qq_end);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/txt/textbuffer.c:2081:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return cToPceStringA(NIL, fd->message, strlen(fd->message), FALSE);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/client.c:103:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(host, address, s-address);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/client.c:125:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( (len = strlen(address)+1) > MAX_UN_ADDRESS_LEN )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/client.c:148:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ( (bytes = read(f, buf, CPSIZE)) > 0 )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:45:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
# define NAMLEN(dirent) strlen((dirent)->d_name)
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:340:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      s += strlen(s)+1;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:385:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t dfnl = strlen(dfn);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:386:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t maxl = strlen(fn) + dfnl + 2;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:649:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(dir, "/");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:651:2:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	strcpy(dir, ".");
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:653:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    { strncpy(dir, f, base-f);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:772:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( (ul=strlen(ucwd)) + strlen(file) + 2 >= buflen )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:772:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( (ul=strlen(ucwd)) + strlen(file) + 2 >= buflen )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:780:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  } else if ( strlen(file)+1 > buflen )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:788:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return (int)strlen(path);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:884:23:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size += (int)(l = wcslen(value));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/directory.c:913:24:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    size += (l = (int)wcslen(value));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:93:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( (s=getenv("TMPDIR")) && strlen(s) < sizeof(namebuf)-13 )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:416:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while( (n = read(fdfrom, buf, CPBUFSIZE)) > 0 )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:447:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ if ( strlen(old) + strlen(ext) + 1 <= len )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:447:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ if ( strlen(old) + strlen(ext) + 1 <= len )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:490:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while( (n = read(fdfrom, buf, CPBUFSIZE)) > 0 )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:663:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( strlen(fn)+strlen(pn)+7 > LINESIZE )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:663:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( strlen(fn)+strlen(pn)+7 > LINESIZE )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:1193:23:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  str_set_n_wchar(&s, wcslen(name), (wchar_t *)name);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:1256:7:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    { wcsncpy(name, pathstr, end-pathstr);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:1263:2:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	wcsncpy(name, bin, l);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:1267:11:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    { l = wcslen(name);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/file.c:1274:38:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    { assign(f, path, WCToName(name, wcslen(name)));
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c:491:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str_set_n_ascii(&vs, strlen(q+1), q+1);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c:983:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  idx = strlen(line);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c:1023:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    slave[strlen("/dev/")] = 't';
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/process.c:1025:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    slave[strlen("/dev/pt")] = 's';
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/unx/socket.c:399:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  *len = strlen(path)+1;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/display.c:1569:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s += strlen(s);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/display.c:1573:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s += strlen(s);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/frame.c:800:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sprintf(buf+strlen(buf),
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/win/frame.c:807:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sprintf(buf+strlen(buf), "@" INTPTR_FORMAT, valInt(n)-1);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/x11.c:77:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(buf);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdnd.c:397:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l += strlen (t[n]) + 1;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdnd.c:406:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l += strlen (t[n]) + 1;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdnd.c:480:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    l = strlen ((char *) r);
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdnd.c:681:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    long read;
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xdnd.c:692:58:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (XGetWindowProperty (dnd->display, insert, property, read / 4, 65536, 1,
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xevent.c:234:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ( read(dispatch_fd, buf, sizeof(buf)) >= 0 )
data/swi-prolog-8.2.3+dfsg/packages/xpce/src/x11/xstream.c:244:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return read(s->rdfd, data, len);
data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/interface.c:334:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define cToPceName(s) cToPceName_nA(s, strlen(s))
data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/interface.c:435:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { *len = strlen(*s);
data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/pcecall.c:337:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ( (n=read(ctx->pipe[0], &g, sizeof(g))) == sizeof(g) )
data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/xpce-stub.c:233:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ask_attach(int read)
data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/xpce-stub.c:236:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ( read )
data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/xpce-stub.c:383:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	o = ok + strlen(ok);
data/swi-prolog-8.2.3+dfsg/packages/xpce/swipl/xpce-stub.c:406:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return strcpy(malloc(strlen(program)+1), program);
data/swi-prolog-8.2.3+dfsg/packages/yaml/yaml4pl.c:286:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(s);
data/swi-prolog-8.2.3+dfsg/packages/yaml/yaml4pl.c:448:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { int k = MurmurHashAligned2(c->name, strlen(c->name), SEED) % newsize;
data/swi-prolog-8.2.3+dfsg/packages/yaml/yaml4pl.c:477:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  k = MurmurHashAligned2(s, strlen(s), SEED) % t->size;
data/swi-prolog-8.2.3+dfsg/packages/yaml/yaml4pl.c:493:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ unsigned int k = MurmurHashAligned2(name, strlen(name), SEED) % t->size;
data/swi-prolog-8.2.3+dfsg/packages/yaml/yaml4pl.c:1005:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( strlen(s) < len )
data/swi-prolog-8.2.3+dfsg/src/libtai/leapsecs_read.c:45:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  n = read(fd,(char *) t,st.st_size);
data/swi-prolog-8.2.3+dfsg/src/minizip/miniunz.c:143:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int  len = (int)strlen(newdir);
data/swi-prolog-8.2.3+dfsg/src/minizip/miniunz.c:390:27:  [1] (buffer) scanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
                    ret = scanf("%1s",answer);
data/swi-prolog-8.2.3+dfsg/src/minizip/miniunz.c:609:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(filename_try, zipfilename,MAXFILENAME-1);
data/swi-prolog-8.2.3+dfsg/src/minizip/minizip.c:111:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen(f);
data/swi-prolog-8.2.3+dfsg/src/minizip/minizip.c:115:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(name, f,MAXFILENAME-1);
data/swi-prolog-8.2.3+dfsg/src/minizip/minizip.c:324:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(filename_try, argv[zipfilenamearg],MAXFILENAME-1);
data/swi-prolog-8.2.3+dfsg/src/minizip/minizip.c:328:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len=(int)strlen(filename_try);
data/swi-prolog-8.2.3+dfsg/src/minizip/minizip.c:352:27:  [1] (buffer) scanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
                    ret = scanf("%1s",answer);
data/swi-prolog-8.2.3+dfsg/src/minizip/minizip.c:396:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  (strlen(argv[i]) == 2)))
data/swi-prolog-8.2.3+dfsg/src/minizip/mztools.c:151:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          int comsize = (int) strlen(comment);
data/swi-prolog-8.2.3+dfsg/src/minizip/mztools.c:226:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int comsize = (int) strlen(comment);
data/swi-prolog-8.2.3+dfsg/src/minizip/unzip.c:1284:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(szFileName)>=UNZ_MAXFILENAMEINZIP)
data/swi-prolog-8.2.3+dfsg/src/minizip/zip.c:972:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  uInt size_filename = (uInt)strlen(filename);
data/swi-prolog-8.2.3+dfsg/src/minizip/zip.c:1111:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_comment = (uInt)strlen(comment);
data/swi-prolog-8.2.3+dfsg/src/minizip/zip.c:1113:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_filename = (uInt)strlen(filename);
data/swi-prolog-8.2.3+dfsg/src/minizip/zip.c:1880:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_global_comment = (uInt)strlen(global_comment);
data/swi-prolog-8.2.3+dfsg/src/mkvmi.c:98:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(&synopsis[syn_size], s, len);
data/swi-prolog-8.2.3+dfsg/src/mkvmi.c:169:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(s, in, len);
data/swi-prolog-8.2.3+dfsg/src/os/SWI-Stream.h:163:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
{ Sread_function	read;		/* fill the buffer */
data/swi-prolog-8.2.3+dfsg/src/os/SWI-Stream.h:317:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#undef getc
data/swi-prolog-8.2.3+dfsg/src/os/SWI-Stream.h:319:8:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#undef getchar
data/swi-prolog-8.2.3+dfsg/src/os/SWI-Stream.h:331:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define	getc		Sgetc
data/swi-prolog-8.2.3+dfsg/src/os/SWI-Stream.h:333:9:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define	fgetc		Sgetc
data/swi-prolog-8.2.3+dfsg/src/os/SWI-Stream.h:340:9:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define getchar		Sgetchar
data/swi-prolog-8.2.3+dfsg/src/os/dtoa.c:1769:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				MALLOC(strlen((CONST char*)s0) + 1))) {
data/swi-prolog-8.2.3+dfsg/src/os/pl-buffer.c:239:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen(s) + 1;
data/swi-prolog-8.2.3+dfsg/src/os/pl-cstack.c:357:16:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while((c=fgetc(fd)) != EOF && o<ebuf)
data/swi-prolog-8.2.3+dfsg/src/os/pl-cstack.c:362:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  if ( nl == 1 && o+strlen(sep) < ebuf)
data/swi-prolog-8.2.3+dfsg/src/os/pl-cstack.c:364:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    o += strlen(sep);
data/swi-prolog-8.2.3+dfsg/src/os/pl-cstack.c:687:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
     { strncpy(trace->frame[depth].module,
data/swi-prolog-8.2.3+dfsg/src/os/pl-cstack.c:697:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
       { strncpy(trace->frame[depth].name,
data/swi-prolog-8.2.3+dfsg/src/os/pl-cstack.c:710:12:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
         { strncpy(trace->frame[depth].name,
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:527:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
{ IOSTREAM *read;
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:537:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ( ref->read && ref->write )
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:538:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    Sfprintf(s, "<stream>(%p,%p)", ref->read, ref->write);
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:539:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  else if ( ref->read )
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:540:38:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    Sfprintf(s, "<stream>(%p)", ref->read);
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:552:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ( ref->read )
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:553:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    Sreference(ref->read);
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:563:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ( ref->read )
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:564:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  { if ( Sunreference(ref->read) == 0 && ref->read->erased )
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:565:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      unallocStream(ref->read);
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:582:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		    ref->read, ref->write);
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:622:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  { if ( ref->read  ) assert(ref->read->references);
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:625:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ( ref->read )
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:630:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  s = ref->read;
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:644:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    s = ref->read;
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:647:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	  s = ref->read;			/* dubious */
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:649:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	s = ref->read;
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:996:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    { if ( ref->read && !ref->read->erased )
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:997:47:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = rc && PL_unify_stream_or_alias(A2, ref->read);
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:1700:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *buf = &buffer[strlen(buffer)];
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:2209:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  { if ( ref->read && ref->write &&	/* stream pair */
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:2214:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ( ref->read && (info->flags&SS_READ))
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:2215:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    { if ( !(s = getStream(ref->read)) )
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:2218:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      releaseStream(ref->read);
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:3494:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  text.length    = strlen(fn);
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:4247:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ( ref->read && ref->write )
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:4252:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if ( ref->read && !ref->read->erased )
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:4253:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = do_close(getStream(ref->read), force) && rc;
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:4255:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    { if ( ref->read )
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:4257:31:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	rc = do_close(getStream(ref->read), force);
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:5440:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  rc = (*wio->wrapped_functions->read)(wio->wrapped_handle, buf, size);
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:5491:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
       ssize_t (*read)(void *, char *, size_t),
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:5502:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ( read  ) wio->functions.read  = read;
data/swi-prolog-8.2.3+dfsg/src/os/pl-file.c:5502:39:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ( read  ) wio->functions.read  = read;
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:293:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      q = &lbuf[strlen(lbuf)];
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:435:8:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  um = umask(0777);
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:436:3:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  umask(um);
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:524:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if ( rc && strlen(*namep) != len )
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:543:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( strlen(name) != len )
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:1075:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const char *s = name + strlen(name);
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:1113:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    { char *s = f + strlen(f);		/* ?base, ?ext, +full */
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:1147:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( strlen(b) + 1 + strlen(e) + 1 > MAXPATHLEN )
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:1147:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( strlen(b) + 1 + strlen(e) + 1 > MAXPATHLEN )
data/swi-prolog-8.2.3+dfsg/src/os/pl-files.c:1150:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s = buf + strlen(buf);
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:179:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ return oututf8(state, s, strlen(s));
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:945:26:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { const wchar_t *e = l+wcslen(l);
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:1075:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char *e = buf+strlen(buf)-1;
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:1101:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { addMultipleBuffer(out, buf, strlen(buf), char);
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:1173:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *len = (int)strlen(s);
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:1220:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	memmove(&e[dplen-ddplen], e, strlen(e)+1);
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:1254:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      thslen = (int)strlen(ths);
data/swi-prolog-8.2.3+dfsg/src/os/pl-fmt.c:1258:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      memmove(&e[groups*thslen], e, strlen(e)+1);
data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c:483:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  txt.length    = strlen(path);
data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c:503:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t n = strlen(path)+1;
data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c:544:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  txt.length    = strlen(name);
data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c:564:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  txt.length    = strlen(name);
data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c:612:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    prefix_len = strlen(prefix);
data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c:618:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	      size_t plen = strlen(entry);
data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c:662:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    prefix_len = strlen(prefix);
data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c:677:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t clen = strlen(current);
data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c:700:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    if ( plen+strlen(e->d_name)+1 < sizeof(newp) )
data/swi-prolog-8.2.3+dfsg/src/os/pl-glob.c:763:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( strlen(s) > sizeof(spec)-1 )
data/swi-prolog-8.2.3+dfsg/src/os/pl-locale.c:75:27:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ wchar_t *copy = malloc((wcslen(in)+1)*sizeof(wchar_t));
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:889:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ if ( strlen(p) < len )
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:993:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(buf, cpaths, l);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1016:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ unsigned int k = MurmurHashAligned2(name, strlen(name), MURMUR_SEED);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1184:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *e = path + strlen(path);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1197:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    { strncpy(parent, path, e-path);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1201:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      strcpy(parent+strlen(parent), e);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1456:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t plen = strlen(path);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1462:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(dirname, path, e-path);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1562:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size += (l = (int) strlen(value));
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1603:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  size += (l = (int)strlen(value));
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1740:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { if ((strlen(file) + 3) > MAXPATHLEN)
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1753:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  cwdlen = strlen(path);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1755:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( (cwdlen + strlen(file) + 1) >= MAXPATHLEN )
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1814:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    GD->paths.CWDlen = strlen(buf);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1848:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { char *e = (char*)f+strlen(f);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1861:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      { strcpy(base, "/");
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1881:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { char *e = (char*)f+strlen(f);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1884:7:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    { strcpy(dir, ".");
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1895:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	  strcpy(dir, "/");
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1897:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
	  strcpy(dir, ".");
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1901:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  { strncpy(dir, f, e-f);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:1957:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(tmp);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2120:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ( !GD->os.org_terminal.read )
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2142:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  size = (*GD->os.org_terminal.read)(handle, buf, size);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2163:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if ( !GD->os.iofunctions.read )
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2438:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { if ( (l=strlen(s)) < len )
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2478:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  buf = alloca(strlen(name) + strlen(value) + 2);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2478:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  buf = alloca(strlen(name) + strlen(value) + 2);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2591:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ size_t l = strlen(name);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2593:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  *e = PL_malloc_atomic(l + strlen(value) + 2);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2902:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    n = read(fd, buf, sizeof(buf)-1);
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:2998:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(fullname, "/");
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:3019:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if ((dir-fullname) + strlen(program)+2 > MAXPATHLEN)
data/swi-prolog-8.2.3+dfsg/src/os/pl-os.c:3083:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
  usleep((unsigned long)(t * 1000000.0));
data/swi-prolog-8.2.3+dfsg/src/os/pl-prologflag.c:205:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      text.length    = strlen(text.text.t);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:624:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    n = (*s->functions->read)(s->handle, &chr, 1);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:660:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    n = (*s->functions->read)(s->handle, s->limitp, len);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:2016:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { q = &s[strlen(s)];
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:2328:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    fe = &fs[strlen(fs)];
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:2363:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  w = strlen(fs);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:2366:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  w = strlen(fs);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:2370:9:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		  w = wcslen((wchar_t*)fs);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:2865:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    bytes = read((int)h, buf, (int)size);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:2867:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    bytes = read((int)h, buf, size);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:3397:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return read(fileno(fp), buf, (unsigned int)size);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:3399:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return read(fileno(fp), buf, size);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:3722:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  size = (mf->buffer ? strlen(mf->buffer) : 0);
data/swi-prolog-8.2.3+dfsg/src/os/pl-stream.c:3832:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size = strlen(buf);
data/swi-prolog-8.2.3+dfsg/src/os/pl-string.c:50:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { char *copy = (char *)allocHeapOrHalt(strlen(s)+1);
data/swi-prolog-8.2.3+dfsg/src/os/pl-string.c:63:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    freeHeap(s, strlen(s)+1);
data/swi-prolog-8.2.3+dfsg/src/os/pl-string.c:129:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ intptr_t offset = strlen(string) - strlen(postfix);
data/swi-prolog-8.2.3+dfsg/src/os/pl-string.c:129:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ intptr_t offset = strlen(string) - strlen(postfix);
data/swi-prolog-8.2.3+dfsg/src/os/pl-string.c:169:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ size_t ls = strlen(s);
data/swi-prolog-8.2.3+dfsg/src/os/pl-string.c:170:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t le = strlen(e);
data/swi-prolog-8.2.3+dfsg/src/os/pl-string.c:201:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ size_t l1 = strlen(s1);
data/swi-prolog-8.2.3+dfsg/src/os/pl-string.c:202:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l2 = strlen(s2);
data/swi-prolog-8.2.3+dfsg/src/os/pl-tai.c:840:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	      for(e=buf+strlen(buf); e>buf && e[-1]>='0' && e[-1]<='9'; e--)
data/swi-prolog-8.2.3+dfsg/src/os/pl-text.c:215:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	b->top = b->base + strlen(b->base);
data/swi-prolog-8.2.3+dfsg/src/os/pl-text.c:230:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	b->top = b->base + strlen(b->base);
data/swi-prolog-8.2.3+dfsg/src/os/pl-text.c:233:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	b->top += strlen(b->top);
data/swi-prolog-8.2.3+dfsg/src/os/pl-text.c:249:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    text->length    = strlen(text->text.t);
data/swi-prolog-8.2.3+dfsg/src/os/pl-text.c:307:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    text->length   = strlen(text->text.t);
data/swi-prolog-8.2.3+dfsg/src/os/windows/popen.c:227:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t utf8len = utf8_strlen(cmd, strlen(cmd));
data/swi-prolog-8.2.3+dfsg/src/os/windows/popen.c:245:6:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
     wcsncpy(err2out, L"    ", 4);
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:73:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define _read read
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:444:20:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { size_t l = _tcslen(data.cFileName);
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:1048:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size = wcslen(valp);		/* return sometimes holds 0-bytes */
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:1050:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      rc = strlen(buf);
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.c:1076:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { size_t wlen = utf8_strlen(value, strlen(value)) + 1;
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.h:65:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#undef read
data/swi-prolog-8.2.3+dfsg/src/os/windows/uxnt.h:82:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define read _xos_read
data/swi-prolog-8.2.3+dfsg/src/pl-arith.c:3864:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      { if ( (n=read(fd, seedarray+rd, sizeof(seedarray)-rd)) > 0 )
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:338:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	atom->length = strlen(atom->name);
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:1486:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    a->length = strlen(s);
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:1513:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(s);
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:1524:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(s);
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:1867:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t lp = strlen(prefix);
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:1887:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   strlen(a->name) < LINESIZ )
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:2131:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  txt.length   = strlen(prefix);
data/swi-prolog-8.2.3+dfsg/src/pl-atom.c:2153:18:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  txt.length   = wcslen(prefix);
data/swi-prolog-8.2.3+dfsg/src/pl-comp.c:6197:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    term_t av = PL_new_term_refs((int)strlen(ats));
data/swi-prolog-8.2.3+dfsg/src/pl-comp.c:6450:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	       strlen(ats) == (size_t)cinfo->arguments);
data/swi-prolog-8.2.3+dfsg/src/pl-debug.c:288:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buf, spec, end-spec);
data/swi-prolog-8.2.3+dfsg/src/pl-dwim.c:152:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l2 = (int) strlen(s2);
data/swi-prolog-8.2.3+dfsg/src/pl-dwim.c:153:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  l1 = (int) strlen(s1);
data/swi-prolog-8.2.3+dfsg/src/pl-ext.c:216:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return MurmurHashAligned2(str, strlen(str), SIGNATURE_SEED);
data/swi-prolog-8.2.3+dfsg/src/pl-ext.c:244:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { size_t len = strlen(str)+1;
data/swi-prolog-8.2.3+dfsg/src/pl-ext.c:372:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
DECL_PLIST(read);
data/swi-prolog-8.2.3+dfsg/src/pl-ext.c:434:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  REG_PLIST(read);
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:423:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return (atom_t) lookupAtom(s, strlen(s));
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:433:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(s);
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:445:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(s);
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:555:11:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = wcslen(s);
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:672:11:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = wcslen(s);
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:694:11:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = wcslen(s);
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:2358:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  word str = globalString(strlen(s), (char *)s);
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:2431:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  atom_t a = lookupAtom(s, strlen(s));
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:2446:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(s);
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:2458:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  word w = globalString(strlen(s), s);
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:2491:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(s);
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:2552:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ return PL_put_list_ncodes(t, strlen(chars), chars);
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:2585:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ return PL_put_list_nchars(t, strlen(chars), chars);
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:2917:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  atom_t a = lookupAtom(chars, strlen(chars));
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:3033:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ return PL_unify_list_ncodes(l, strlen(chars), chars);
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:3066:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ return PL_unify_list_nchars(l, strlen(chars), chars);
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:3085:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(s);
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:3474:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      txt.length    = strlen(txt.text.t);
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:3516:15:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	txt.length = wcslen(txt.text.w );
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:3532:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      txt.length    = strlen(txt.text.t);
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:4093:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  atom_t a    = lookupAtom(name, strlen(name));
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:4100:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    a = lookupAtom(module, strlen(module));
data/swi-prolog-8.2.3+dfsg/src/pl-fli.c:4857:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ prompt1(lookupAtom(s, strlen(s)));
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:342:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( strlen(s) > 10 )
data/swi-prolog-8.2.3+dfsg/src/pl-gc.c:343:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    { strncpy(o, s, 10);
data/swi-prolog-8.2.3+dfsg/src/pl-index.c:391:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s += strlen(s);
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:103:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ const char *s=exec_vars + strlen(EXECVARMAGIC);
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:104:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen(name);
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:268:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	 strlen(PLHOMEFILE) + 1 + strlen(pparent) + 1 > sizeof(parent) )
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:268:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	 strlen(PLHOMEFILE) + 1 + strlen(pparent) + 1 > sizeof(parent) )
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:275:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { size_t l = strlen(buf);
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:836:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ char *s = path + strlen(path);
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:847:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  s += strlen(s);
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:907:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       strlen(exedir)+strlen("/swipl.prc")+1 < MAXPATHLEN )
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:907:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       strlen(exedir)+strlen("/swipl.prc")+1 < MAXPATHLEN )
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:914:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { if ( strlen(systemDefaults.home)+1+strlen(SWIPL_BOOT_BASE) < MAXPATHLEN )
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:914:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { if ( strlen(systemDefaults.home)+1+strlen(SWIPL_BOOT_BASE) < MAXPATHLEN )
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:916:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(tmp, "/");
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:982:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    op += strlen(op)+1;
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:1661:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    Svsnprintf(&msg[strlen(msg)], sizeof(msg)-strlen(msg), fm, args);
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:1661:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    Svsnprintf(&msg[strlen(msg)], sizeof(msg)-strlen(msg), fm, args);
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:1662:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    Ssnprintf(&msg[strlen(msg)], sizeof(msg)-strlen(msg), "]");
data/swi-prolog-8.2.3+dfsg/src/pl-init.c:1662:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    Ssnprintf(&msg[strlen(msg)], sizeof(msg)-strlen(msg), "]");
data/swi-prolog-8.2.3+dfsg/src/pl-load.c:308:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( strlen(fname)+strlen(LD_SYMBOL_PREFIX) > MAXSYMBOLLEN )
data/swi-prolog-8.2.3+dfsg/src/pl-load.c:308:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( strlen(fname)+strlen(LD_SYMBOL_PREFIX) > MAXSYMBOLLEN )
data/swi-prolog-8.2.3+dfsg/src/pl-nt.c:474:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = utf8_strlen(command, strlen(command));
data/swi-prolog-8.2.3+dfsg/src/pl-nt.c:691:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { size_t len = utf8_strlen(dirs, strlen(dirs));
data/swi-prolog-8.2.3+dfsg/src/pl-nt.c:743:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = utf8_strlen(file, strlen(file));
data/swi-prolog-8.2.3+dfsg/src/pl-ntmain.c:509:2:  [1] (buffer) _tcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	_tcsncpy(data->buf_handle, &ln->data[start], patlen);
data/swi-prolog-8.2.3+dfsg/src/pl-ntmain.c:588:40:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return PL_unify_wchars(old, PL_ATOM, _tcslen(buf), buf);
data/swi-prolog-8.2.3+dfsg/src/pl-ntmain.c:703:16:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = _tcslen(name);
data/swi-prolog-8.2.3+dfsg/src/pl-prims.c:1984:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
PRED_IMPL("==", 2, equal, 0)
data/swi-prolog-8.2.3+dfsg/src/pl-prims.c:5799:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  PRED_DEF("==", 2, equal, PL_FA_ISO)
data/swi-prolog-8.2.3+dfsg/src/pl-pro.c:686:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( sz != (len=strlen(s)) )
data/swi-prolog-8.2.3+dfsg/src/pl-pro.c:701:18:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ( sz != (len=wcslen(s)) )
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2110:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      o += strlen(o);
data/swi-prolog-8.2.3+dfsg/src/pl-proc.c:2120:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      o += strlen(o);
data/swi-prolog-8.2.3+dfsg/src/pl-read.c:1530:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ return MurmurHashAligned2(var->name, strlen(var->name), MURMUR_SEED);
data/swi-prolog-8.2.3+dfsg/src/pl-read.c:1780:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     txt.length    = strlen(var->name);
data/swi-prolog-8.2.3+dfsg/src/pl-read.c:3561:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { last_token_start += strlen(opname);
data/swi-prolog-8.2.3+dfsg/src/pl-read.c:3566:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      last_token_start += strlen(opname);
data/swi-prolog-8.2.3+dfsg/src/pl-read.c:5166:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(s);
data/swi-prolog-8.2.3+dfsg/src/pl-read.c:5235:20:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  text.length    = wcslen(s);
data/swi-prolog-8.2.3+dfsg/src/pl-read.c:5327:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
BeginPredDefs(read)
data/swi-prolog-8.2.3+dfsg/src/pl-ressymbol.c:117:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ return new_reserved_symbol(strlen(s), s);
data/swi-prolog-8.2.3+dfsg/src/pl-setup.c:337:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ( strncmp(name, "SIG", 3) == 0 && strlen(name) < 12 )
data/swi-prolog-8.2.3+dfsg/src/pl-termhash.c:486:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	HASH(av->type->name, (unsigned long)strlen(av->type->name));
data/swi-prolog-8.2.3+dfsg/src/pl-thread.c:1692:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(name, s, 15);
data/swi-prolog-8.2.3+dfsg/src/pl-thread.c:5941:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    pos = read(fd, buffer, sizeof(buffer)-1);
data/swi-prolog-8.2.3+dfsg/src/pl-thread.c:5999:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    n = read(e->fd, buffer, sizeof(buffer)-1);
data/swi-prolog-8.2.3+dfsg/src/pl-util.c:147:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    e += strlen(e);
data/swi-prolog-8.2.3+dfsg/src/pl-util.c:151:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  e += strlen(e);
data/swi-prolog-8.2.3+dfsg/src/pl-util.c:170:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  e += strlen(e);
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:1401:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			 (size_t)codeTable[op].arguments == strlen(ats) ||
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:1667:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t lensave = strlen(state->load_state->save_dir);
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:1670:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( strlen(state->load_state->load_dir)+1+strlen(tail)+1 > MAXPATHLEN )
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:1670:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( strlen(state->load_state->load_dir)+1+strlen(tail)+1 > MAXPATHLEN )
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:1674:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s = &buf[strlen(buf)];
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:1677:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { if ( strlen(raw)+1 > MAXPATHLEN )
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:1981:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(s);
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:1998:11:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = wcslen(s);
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:3253:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( ( strlen(abssavename)+1 > MAXPATHLEN ||
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:3254:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   strlen(absloadname)+1 > MAXPATHLEN
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:3267:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    le = l+strlen(l);
data/swi-prolog-8.2.3+dfsg/src/pl-wic.c:3268:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    se = s+strlen(s);
data/swi-prolog-8.2.3+dfsg/src/pl-xterm.c:85:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  { size = read(xt->fd, buffer, count);
data/swi-prolog-8.2.3+dfsg/src/pl-xterm.c:279:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    cc = slavename+strlen(slavename)-2;
data/swi-prolog-8.2.3+dfsg/src/pl-xterm.c:300:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ( read(slave, &c, 1) < 0 )
data/swi-prolog-8.2.3+dfsg/src/pl-zip.c:224:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    m += strlen(m);
data/swi-prolog-8.2.3+dfsg/src/pl-zip.c:853:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    extralen = strlen(extra);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:216:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define strprefix(s, p) (strncmp((s), (p), strlen(p)) == 0)
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:403:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ return strcpy(xmalloc(strlen(in)+1), in);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:521:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    { strncpy(tmp, f, from-f);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:925:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    { appendOptions(&coptions, opt+strlen("-cc-options"));
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:926:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      appendOptions(&cppoptions, opt+strlen("-cc-options"));
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:928:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    { appendOptions(&ldoptions, opt+strlen("-ld-options"));
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:930:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    { appendOptions(&ploptions, opt+strlen("-pl-options"));
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:963:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    e = s + strlen(s);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1198:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return to+strlen(to);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1210:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  e = &e[strlen(e)];
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1302:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  e = tmp + strlen(tmp);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1475:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  to += strlen(to);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1478:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  to += strlen(to);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1491:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  e = buf + strlen(buf);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1496:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    e += strlen(e);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1502:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    e += strlen(e);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1505:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  e += strlen(e);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1507:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  e += strlen(e);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1509:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  e += strlen(e);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1520:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  e += strlen(e);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1541:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while( (n=read(i, buf, sizeof(buf))) > 0 )
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1619:16:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  { int mask = umask(0777);
data/swi-prolog-8.2.3+dfsg/src/swipl-ld.c:1621:5:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    umask(mask);
data/swi-prolog-8.2.3+dfsg/src/test/lwrcase.c:46:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  copy = malloc(strlen(s)+1);
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:329:11:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	o = ok + _tcslen(ok);
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:548:5:  [1] (buffer) _tcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  { _tcsncpy(base, s, e-s);
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:626:31:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		     (LPBYTE)value, (DWORD)(_tcslen(value)+1)*sizeof(TCHAR)) != ERROR_SUCCESS )
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:709:2:  [1] (buffer) _tcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	_tcsncpy(value, val, length-1);
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:1384:9:  [1] (buffer) _tcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      { _tcsncpy(&b->output_queue[b->output_queued], buf, count);
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:1391:4:  [1] (buffer) _tcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	{ _tcsncpy(b->output_queue, buf, count);
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:1815:19:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  { size_t size = _tcslen(sel);
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:2183:7:  [1] (buffer) _tcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      _tcsncpy(lfont.lfFaceName, a->face_name, 31);
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:3086:27:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    rlc_write(b, waiting, _tcslen(waiting));
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:3364:29:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d->read_buffer.length = _tcslen(d->read_buffer.line);
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:3373:3:  [1] (buffer) _tcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  _tcsncpy(buf, d->read_buffer.line+d->read_buffer.given, give);
data/swi-prolog-8.2.3+dfsg/src/win32/console/console.c:3519:7:  [1] (buffer) _tcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    { _tcsncpy(b->prompt, new, MAXPROMPT);
data/swi-prolog-8.2.3+dfsg/src/win32/console/edit.c:115:16:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
{ size_t len = _tcslen(s);
data/swi-prolog-8.2.3+dfsg/src/win32/console/edit.c:119:3:  [1] (buffer) _tcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  _tcsncpy(ln->data, s, len);
data/swi-prolog-8.2.3+dfsg/src/win32/console/edit.c:138:3:  [1] (buffer) _tcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  _tcsncpy(&ln->data[from], &ln->data[from+len], ln->size - (from+len));
data/swi-prolog-8.2.3+dfsg/src/win32/console/edit.c:442:24:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t ncommon = _tcslen(data->candidate);
data/swi-prolog-8.2.3+dfsg/src/win32/console/edit.c:459:7:  [1] (buffer) _tcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      _tcsncpy(&ln->data[data->replace_from], match, ncommon);
data/swi-prolog-8.2.3+dfsg/src/win32/console/edit.c:482:20:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = _tcslen(data->candidate) + 1;
data/swi-prolog-8.2.3+dfsg/src/win32/console/edit.c:487:7:  [1] (buffer) _tcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      _tcsncpy(buf[nmatches], data->candidate, len);
data/swi-prolog-8.2.3+dfsg/src/win32/console/edit.c:492:15:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      { len = _tcslen(data->candidate) + 1;
data/swi-prolog-8.2.3+dfsg/src/win32/console/edit.c:494:2:  [1] (buffer) _tcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	_tcsncpy(buf[nmatches], data->candidate, len);
data/swi-prolog-8.2.3+dfsg/src/win32/console/history.c:94:18:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = _tcslen(line);
data/swi-prolog-8.2.3+dfsg/src/win32/console/history.c:98:11:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = _tcslen(line);
data/swi-prolog-8.2.3+dfsg/src/win32/console/history.c:126:7:  [1] (buffer) _tcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    { _tcsncpy(b->history.lines[i], line, len);
data/swi-prolog-8.2.3+dfsg/src/win32/console/menu.c:94:10:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  llen = _tcslen(label);
data/swi-prolog-8.2.3+dfsg/src/win32/console/menu.c:96:3:  [1] (buffer) _tcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  _tcsncpy(menuids[nmenus], label, llen+1);
data/swi-prolog-8.2.3+dfsg/src/win32/console/menu.c:138:23:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      info.cch = (int)_tcslen(label);
data/swi-prolog-8.2.3+dfsg/src/win32/console/menu.c:277:23:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      info.cch = (int)_tcslen(data->label);
data/swi-prolog-8.2.3+dfsg/src/win32/console/registry.c:53:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(buf, path, sep-path);
data/swi-prolog-8.2.3+dfsg/src/win32/console/registry.c:83:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(buf, path, sep-path);

ANALYSIS SUMMARY:

Hits = 2868
Lines analyzed = 515266 in approximately 13.15 seconds (39184 lines/second)
Physical Source Lines of Code (SLOC) = 371705
Hits@level = [0] 612 [1] 713 [2] 1484 [3]  91 [4] 568 [5]  12
Hits@level+ = [0+] 3480 [1+] 2868 [2+] 2155 [3+] 671 [4+] 580 [5+]  12
Hits/KSLOC@level+ = [0+] 9.36226 [1+] 7.7158 [2+] 5.79761 [3+] 1.80519 [4+] 1.56038 [5+] 0.0322837
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.