Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/tkhtml1-1.04/src/html.h
Examining data/tkhtml1-1.04/src/htmlcmd.c
Examining data/tkhtml1-1.04/src/htmlcmd.h
Examining data/tkhtml1-1.04/src/htmldraw.c
Examining data/tkhtml1-1.04/src/htmldraw.h
Examining data/tkhtml1-1.04/src/htmlexts.c
Examining data/tkhtml1-1.04/src/htmlexts.h
Examining data/tkhtml1-1.04/src/htmlform.c
Examining data/tkhtml1-1.04/src/htmlform.h
Examining data/tkhtml1-1.04/src/htmlimage.c
Examining data/tkhtml1-1.04/src/htmlimage.h
Examining data/tkhtml1-1.04/src/htmlindex.c
Examining data/tkhtml1-1.04/src/htmlindex.h
Examining data/tkhtml1-1.04/src/htmllayout.c
Examining data/tkhtml1-1.04/src/htmllayout.h
Examining data/tkhtml1-1.04/src/htmlparse.c
Examining data/tkhtml1-1.04/src/htmlparse.h
Examining data/tkhtml1-1.04/src/htmlsizer.c
Examining data/tkhtml1-1.04/src/htmlsizer.h
Examining data/tkhtml1-1.04/src/htmltable.c
Examining data/tkhtml1-1.04/src/htmltable.h
Examining data/tkhtml1-1.04/src/htmltest.c
Examining data/tkhtml1-1.04/src/htmltest.h
Examining data/tkhtml1-1.04/src/htmltokens.c
Examining data/tkhtml1-1.04/src/htmltokens.h
Examining data/tkhtml1-1.04/src/htmlurl.c
Examining data/tkhtml1-1.04/src/htmlurl.h
Examining data/tkhtml1-1.04/src/htmlwidget.c
Examining data/tkhtml1-1.04/src/htmlwidget.h
Examining data/tkhtml1-1.04/tools/getpage.c
Examining data/tkhtml1-1.04/tools/httpget.c
Examining data/tkhtml1-1.04/tools/makeheaders.c
Examining data/tkhtml1-1.04/tools/sgmlparse.c
Examining data/tkhtml1-1.04/tools/url.c

FINAL RESULTS:

data/tkhtml1-1.04/src/html.h:62:22:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
       TRACE_INDENT; printf Args; fflush(stdout); \
data/tkhtml1-1.04/src/htmlcmd.c:388:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(htmlPtr->zHandler[type],argv[4]);
data/tkhtml1-1.04/src/htmldraw.c:778:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(&zBuf[n], pElem->text.zText);
data/tkhtml1-1.04/src/htmlform.c:207:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(zBuf,"%s.x%d",Tk_PathName(htmlPtr->clipwin), pElem->input.cnt);
data/tkhtml1-1.04/src/htmlimage.c:196:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(pImage->zUrl,zSrc);
data/tkhtml1-1.04/src/htmlimage.c:199:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(pImage->zWidth, zWidth);
data/tkhtml1-1.04/src/htmlimage.c:201:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(pImage->zHeight, zHeight);
data/tkhtml1-1.04/src/htmllayout.h:338:22:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
       TRACE_INDENT; printf Args; fflush(stdout); \
data/tkhtml1-1.04/src/htmlparse.c:903:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(&htmlPtr->zText[htmlPtr->nText], zText);
data/tkhtml1-1.04/src/htmlparse.c:995:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(pElem->markup.argv[i-1],argv[i]);
data/tkhtml1-1.04/src/htmlparse.c:1094:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(zBuf,"<%s",zName);
data/tkhtml1-1.04/src/htmlparse.c:1096:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(&zBuf[strlen(zBuf)]," %s=%s",
data/tkhtml1-1.04/src/htmlsizer.c:249:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(zCmd,"%s {%s}",htmlPtr->zIsVisited, zURL);
data/tkhtml1-1.04/src/htmlsizer.h:24:22:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
       TRACE_INDENT; printf Args; fflush(stdout); \
data/tkhtml1-1.04/src/htmltable.h:140:22:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
       TRACE_INDENT; printf Args; fflush(stdout); \
data/tkhtml1-1.04/src/htmlurl.c:169:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(z, "%s:", p->zScheme);
data/tkhtml1-1.04/src/htmlurl.c:173:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(&z[n], "//%s", p->zAuthority);
data/tkhtml1-1.04/src/htmlurl.c:177:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(&z[n], "%s", p->zPath);
data/tkhtml1-1.04/src/htmlurl.c:181:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(&z[n], "?%s", p->zQuery);
data/tkhtml1-1.04/src/htmlurl.c:185:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(&z[n], "#%s", p->zFragment);
data/tkhtml1-1.04/src/htmlurl.c:215:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(zNew, z);
data/tkhtml1-1.04/src/htmlurl.c:316:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(zBuf,"%s", base->zPath);
data/tkhtml1-1.04/src/htmlurl.c:318:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          strcat(zBuf, term->zPath);
data/tkhtml1-1.04/src/htmlurl.c:326:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	      strcpy(zBuf+i+1, tmp);
data/tkhtml1-1.04/src/htmlurl.c:344:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(zBuf+j+1, tmp);
data/tkhtml1-1.04/src/htmlurl.c:361:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(zBuf, tmp);
data/tkhtml1-1.04/src/htmlurl.c:396:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    if( zSrc ) strcpy(zSrc, Tcl_GetStringResult(htmlPtr->interp));
data/tkhtml1-1.04/src/htmlwidget.c:1365:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(name, familyStr, size);
data/tkhtml1-1.04/src/htmlwidget.c:1442:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(zAltColor,"#%s",zColor);
data/tkhtml1-1.04/src/htmlwidget.c:1444:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(zAltColor, zColor);
data/tkhtml1-1.04/src/htmlwidget.c:1905:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(zClipwin,"%s.x",argv[1]);
data/tkhtml1-1.04/src/htmlwidget.c:1921:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(htmlPtr->zCmdName, argv[1]);
data/tkhtml1-1.04/tools/getpage.c:43:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(p->zUrl, zUrl);
data/tkhtml1-1.04/tools/getpage.c:64:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf(html, zText);
data/tkhtml1-1.04/tools/makeheaders.c:23:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define debug0(F,M)       if( (F)&debugMask ){ fprintf(stderr,M); }
data/tkhtml1-1.04/tools/makeheaders.c:24:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define debug1(F,M,A)     if( (F)&debugMask ){ fprintf(stderr,M,A); }
data/tkhtml1-1.04/tools/makeheaders.c:25:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define debug2(F,M,A,B)   if( (F)&debugMask ){ fprintf(stderr,M,A,B); }
data/tkhtml1-1.04/tools/makeheaders.c:26:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define debug3(F,M,A,B,C) if( (F)&debugMask ){ fprintf(stderr,M,A,B,C); }
data/tkhtml1-1.04/tools/makeheaders.c:1860:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(pIf->zCondition,"%s(%.*s)",zPrefix,nText,zText);
data/tkhtml1-1.04/tools/makeheaders.c:1968:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(pInclude->zLabel,"%.*s:%s",nArg,zArg,zIf);
data/tkhtml1-1.04/tools/makeheaders.c:2945:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy( zNew[j], zBuf );
data/tkhtml1-1.04/tools/sgmlparse.c:188:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(pNew->zName,zName);
data/tkhtml1-1.04/tools/url.c:141:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(z, "%s:", p->zScheme);
data/tkhtml1-1.04/tools/url.c:145:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(&z[n], "//%s", p->zAuthority);
data/tkhtml1-1.04/tools/url.c:149:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(&z[n], "%s", p->zPath);
data/tkhtml1-1.04/tools/url.c:153:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(&z[n], "?%s", p->zQuery);
data/tkhtml1-1.04/tools/url.c:157:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(&z[n], "#%s", p->zFragment);
data/tkhtml1-1.04/tools/url.c:185:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(zNew, z);
data/tkhtml1-1.04/tools/url.c:231:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(zBuf,"%s", base->zPath);
data/tkhtml1-1.04/tools/url.c:233:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(zBuf, term->zPath);
data/tkhtml1-1.04/tools/url.c:236:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(&zBuf[i+1], &zBuf[i+3]);
data/tkhtml1-1.04/tools/url.c:248:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
              strcpy(&zBuf[j+1], &zBuf[i+4]);
data/tkhtml1-1.04/src/html.h:289:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zText[1];              /* Text for this element.  Null terminated */
data/tkhtml1-1.04/src/html.h:784:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *zHandler[Html_TypeCount]; /* If not NULL, this is a TCL routine that
data/tkhtml1-1.04/src/html.h:826:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fontValid[(N_FONT+7)/8]; /* If bit N%8 of work N/8 of this field is 0
data/tkhtml1-1.04/src/htmlcmd.c:58:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		(char *) htmlPtr, argv[2], 0);
data/tkhtml1-1.04/src/htmlcmd.c:98:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        (char *) htmlPtr, argv[2], 0);
data/tkhtml1-1.04/src/htmlcmd.c:415:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf((char*)Tcl_GetStringResult(interp), "%d.%d", HtmlTokenNumber(p), i);
data/tkhtml1-1.04/src/htmlcmd.h:94:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zText[1];              /* Text for this element.  Null terminated */
data/tkhtml1-1.04/src/htmlcmd.h:355:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *zHandler[Html_TypeCount]; /* If not NULL, this is a TCL routine that
data/tkhtml1-1.04/src/htmlcmd.h:397:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fontValid[(N_FONT+7)/8]; /* If bit N%8 of work N/8 of this field is 0
data/tkhtml1-1.04/src/htmldraw.c:129:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(zBuf,"%d",index);
data/tkhtml1-1.04/src/htmldraw.c:188:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(zBuf,"%d",index);
data/tkhtml1-1.04/src/htmldraw.c:411:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zBuf[30];
data/tkhtml1-1.04/src/htmldraw.c:419:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(zBuf,"%d.",src->li.cnt);
data/tkhtml1-1.04/src/htmldraw.c:654:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[400];
data/tkhtml1-1.04/src/htmldraw.h:80:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zText[1];              /* Text for this element.  Null terminated */
data/tkhtml1-1.04/src/htmldraw.h:338:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *zHandler[Html_TypeCount]; /* If not NULL, this is a TCL routine that
data/tkhtml1-1.04/src/htmldraw.h:380:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fontValid[(N_FONT+7)/8]; /* If bit N%8 of work N/8 of this field is 0
data/tkhtml1-1.04/src/htmlexts.h:40:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zText[1];              /* Text for this element.  Null terminated */
data/tkhtml1-1.04/src/htmlexts.h:294:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *zHandler[Html_TypeCount]; /* If not NULL, this is a TCL routine that
data/tkhtml1-1.04/src/htmlexts.h:336:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fontValid[(N_FONT+7)/8]; /* If bit N%8 of work N/8 of this field is 0
data/tkhtml1-1.04/src/htmlform.c:111:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char zBuf[60];
data/tkhtml1-1.04/src/htmlform.c:114:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(zBuf," %d flush", p->input.pForm->form.id);
data/tkhtml1-1.04/src/htmlform.c:435:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char zToken[50];
data/tkhtml1-1.04/src/htmlform.c:444:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(zToken," %d input ",pElem->input.pForm->form.id);
data/tkhtml1-1.04/src/htmlform.c:463:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char zToken[50];
data/tkhtml1-1.04/src/htmlform.c:472:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(zToken," %d select ",pElem->input.pForm->form.id);
data/tkhtml1-1.04/src/htmlform.c:494:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char zToken[50];
data/tkhtml1-1.04/src/htmlform.c:503:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(zToken," %d textarea ",pElem->input.pForm->form.id);
data/tkhtml1-1.04/src/htmlform.c:597:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char zBuf[5];
data/tkhtml1-1.04/src/htmlform.c:598:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(zBuf,"%%%02X",0xff & *z);
data/tkhtml1-1.04/src/htmlform.h:89:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zText[1];              /* Text for this element.  Null terminated */
data/tkhtml1-1.04/src/htmlform.h:341:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *zHandler[Html_TypeCount]; /* If not NULL, this is a TCL routine that
data/tkhtml1-1.04/src/htmlform.h:383:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fontValid[(N_FONT+7)/8]; /* If bit N%8 of work N/8 of this field is 0
data/tkhtml1-1.04/src/htmlimage.h:125:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *zHandler[Html_TypeCount]; /* If not NULL, this is a TCL routine that
data/tkhtml1-1.04/src/htmlimage.h:167:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fontValid[(N_FONT+7)/8]; /* If bit N%8 of work N/8 of this field is 0
data/tkhtml1-1.04/src/htmlimage.h:303:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zText[1];              /* Text for this element.  Null terminated */
data/tkhtml1-1.04/src/htmlindex.h:155:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *zHandler[Html_TypeCount]; /* If not NULL, this is a TCL routine that
data/tkhtml1-1.04/src/htmlindex.h:197:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fontValid[(N_FONT+7)/8]; /* If bit N%8 of work N/8 of this field is 0
data/tkhtml1-1.04/src/htmlindex.h:286:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zText[1];              /* Text for this element.  Null terminated */
data/tkhtml1-1.04/src/htmllayout.c:894:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        p->hr.h = atoi(z);
data/tkhtml1-1.04/src/htmllayout.c:914:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        wd = (atoi(z)*w)/100;
data/tkhtml1-1.04/src/htmllayout.c:916:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        wd = atoi(z);
data/tkhtml1-1.04/src/htmllayout.h:110:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *zHandler[Html_TypeCount]; /* If not NULL, this is a TCL routine that
data/tkhtml1-1.04/src/htmllayout.h:152:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fontValid[(N_FONT+7)/8]; /* If bit N%8 of work N/8 of this field is 0
data/tkhtml1-1.04/src/htmllayout.h:380:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zText[1];              /* Text for this element.  Null terminated */
data/tkhtml1-1.04/src/htmlparse.c:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  value[8];         /* The value for this sequence.       ex:  "&" */
data/tkhtml1-1.04/src/htmlparse.c:339:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char value[8];
data/tkhtml1-1.04/src/htmlparse.c:558:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *argv[mxARG];   /* Pointers to each markup argument. */
data/tkhtml1-1.04/src/htmlparse.c:655:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(pElem->text.zText,"%.*s",i,&z[n]);
data/tkhtml1-1.04/src/htmlparse.c:800:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(pElem->markup.argv[j-1],"%.*s",arglen[j],argv[j]);
data/tkhtml1-1.04/src/htmlparse.c:1062:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char zBuf[200];
data/tkhtml1-1.04/src/htmlparse.c:1069:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(zBuf,"\"%.*s\"",p->base.count,p->text.zText);
data/tkhtml1-1.04/src/htmlparse.c:1073:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(zBuf,"\"\\n\"");
data/tkhtml1-1.04/src/htmlparse.c:1075:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(zBuf,"\" \"");
data/tkhtml1-1.04/src/htmlparse.c:1082:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(zBuf,"<Block z=\"%.*s\">", n, p->block.z);
data/tkhtml1-1.04/src/htmlparse.c:1084:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(zBuf,"<Block>");
data/tkhtml1-1.04/src/htmlparse.c:1115:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zLine[100];
data/tkhtml1-1.04/src/htmlparse.c:1129:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(zLine,"Space %d %d",
data/tkhtml1-1.04/src/htmlparse.h:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zText[1];              /* Text for this element.  Null terminated */
data/tkhtml1-1.04/src/htmlparse.h:327:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *zHandler[Html_TypeCount]; /* If not NULL, this is a TCL routine that
data/tkhtml1-1.04/src/htmlparse.h:369:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fontValid[(N_FONT+7)/8]; /* If bit N%8 of work N/8 of this field is 0
data/tkhtml1-1.04/src/htmlsizer.c:555:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            size = FontSize(style.font) - atoi(&z[1]);
data/tkhtml1-1.04/src/htmlsizer.c:557:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            size = FontSize(style.font) + atoi(&z[1]);
data/tkhtml1-1.04/src/htmlsizer.c:559:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            size = atoi(z);
data/tkhtml1-1.04/src/htmlsizer.c:581:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char zToken[50];
data/tkhtml1-1.04/src/htmlsizer.c:599:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(zToken," %d form ", ++htmlPtr->nForm);
data/tkhtml1-1.04/src/htmlsizer.c:681:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
              int n = atoi(z);
data/tkhtml1-1.04/src/htmlsizer.c:741:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          int n = atoi(z);
data/tkhtml1-1.04/src/htmlsizer.c:1100:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        p->cell.rowspan = atoi(z);
data/tkhtml1-1.04/src/htmlsizer.c:1102:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        p->cell.colspan = atoi(z);
data/tkhtml1-1.04/src/htmlsizer.c:1134:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          int w = atoi(z);
data/tkhtml1-1.04/src/htmlsizer.c:1138:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          int h = atoi(z);
data/tkhtml1-1.04/src/htmlsizer.h:220:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zText[1];              /* Text for this element.  Null terminated */
data/tkhtml1-1.04/src/htmlsizer.h:499:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *zHandler[Html_TypeCount]; /* If not NULL, this is a TCL routine that
data/tkhtml1-1.04/src/htmlsizer.h:541:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fontValid[(N_FONT+7)/8]; /* If bit N%8 of work N/8 of this field is 0
data/tkhtml1-1.04/src/htmltable.c:67:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    cellSpacing = atoi(z);
data/tkhtml1-1.04/src/htmltable.c:143:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  tbw = pStart->table.borderWidth = z ? atoi(z) : DFLT_BORDER;
data/tkhtml1-1.04/src/htmltable.c:146:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  cellPadding = z ? atoi(z) : DFLT_CELLPADDING;
data/tkhtml1-1.04/src/htmltable.c:163:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  hspace = z ? atoi(z) : DFLT_HSPACE;
data/tkhtml1-1.04/src/htmltable.c:246:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            requestedW = atoi(z);
data/tkhtml1-1.04/src/htmltable.c:249:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            requestedW = (atoi(z)*maxTableWidth + 99)/100;
data/tkhtml1-1.04/src/htmltable.c:458:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      totalWidth = (atoi(z) * lineWidth)/100;
data/tkhtml1-1.04/src/htmltable.c:460:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      totalWidth = atoi(z);
data/tkhtml1-1.04/src/htmltable.c:831:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  cellPadding = z ? atoi(z) : DFLT_CELLPADDING;
data/tkhtml1-1.04/src/htmltable.c:834:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  vspace = z ? atoi(z) : DFLT_VSPACE;
data/tkhtml1-1.04/src/htmltable.c:836:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  hspace = z ? atoi(z) : DFLT_HSPACE;
data/tkhtml1-1.04/src/htmltable.h:173:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zText[1];              /* Text for this element.  Null terminated */
data/tkhtml1-1.04/src/htmltable.h:398:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *zHandler[Html_TypeCount]; /* If not NULL, this is a TCL routine that
data/tkhtml1-1.04/src/htmltable.h:440:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fontValid[(N_FONT+7)/8]; /* If bit N%8 of work N/8 of this field is 0
data/tkhtml1-1.04/src/htmltest.c:91:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(filename,"a");
data/tkhtml1-1.04/src/htmltokens.h:316:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zText[1];              /* Text for this element.  Null terminated */
data/tkhtml1-1.04/src/htmltokens.h:460:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *zHandler[Html_TypeCount]; /* If not NULL, this is a TCL routine that
data/tkhtml1-1.04/src/htmltokens.h:502:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fontValid[(N_FONT+7)/8]; /* If bit N%8 of work N/8 of this field is 0
data/tkhtml1-1.04/src/htmlurl.c:91:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zResult, z, n);
data/tkhtml1-1.04/src/htmlurl.c:384:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *azSeq[2];
data/tkhtml1-1.04/src/htmlurl.h:116:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *zHandler[Html_TypeCount]; /* If not NULL, this is a TCL routine that
data/tkhtml1-1.04/src/htmlurl.h:158:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fontValid[(N_FONT+7)/8]; /* If bit N%8 of work N/8 of this field is 0
data/tkhtml1-1.04/src/htmlurl.h:283:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zText[1];              /* Text for this element.  Null terminated */
data/tkhtml1-1.04/src/htmlwidget.c:235:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf,"%g %g",frac1, frac2);
data/tkhtml1-1.04/src/htmlwidget.c:271:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf,"%g %g",frac1, frac2);
data/tkhtml1-1.04/src/htmlwidget.c:431:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[200];
data/tkhtml1-1.04/src/htmlwidget.c:452:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[200];
data/tkhtml1-1.04/src/htmlwidget.c:1284:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[200];     /* Name of the font */
data/tkhtml1-1.04/src/htmlwidget.c:1295:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char zBuf[100];     /* Temporary buffer */
data/tkhtml1-1.04/src/htmlwidget.c:1299:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(zBuf, " %d {", FontSize(iFont)+1);
data/tkhtml1-1.04/src/htmlwidget.c:1327:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name,"%.100s", Tcl_GetStringResult(htmlPtr->interp));
data/tkhtml1-1.04/src/htmlwidget.c:1423:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zAltColor[16];
data/tkhtml1-1.04/src/htmlwidget.h:127:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zText[1];              /* Text for this element.  Null terminated */
data/tkhtml1-1.04/src/htmlwidget.h:434:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *zHandler[Html_TypeCount]; /* If not NULL, this is a TCL routine that
data/tkhtml1-1.04/src/htmlwidget.h:476:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fontValid[(N_FONT+7)/8]; /* If bit N%8 of work N/8 of this field is 0
data/tkhtml1-1.04/tools/getpage.c:27:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char baseUrl[1000];/* The base URL */
data/tkhtml1-1.04/tools/getpage.c:45:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(p->zLocal,"image%d", ++nImage);
data/tkhtml1-1.04/tools/getpage.c:86:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      const char *azUrl[2];
data/tkhtml1-1.04/tools/getpage.c:112:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(baseUrl,"%.*s", sizeof(baseUrl), argv[i+1]);
data/tkhtml1-1.04/tools/getpage.c:150:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  in = fopen(zTemp,"r");
data/tkhtml1-1.04/tools/getpage.c:156:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  html = fopen("index.html","w");
data/tkhtml1-1.04/tools/httpget.c:34:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zIpAddr[400];        /* The IP address of the server to print */
data/tkhtml1-1.04/tools/httpget.c:35:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zMsg[1000];          /* Space to hold error messages */
data/tkhtml1-1.04/tools/httpget.c:36:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zLine[1000];         /* A single line of the header */
data/tkhtml1-1.04/tools/httpget.c:38:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  out = fopen(zLocalFile, "w");
data/tkhtml1-1.04/tools/httpget.c:40:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(zMsg, "can't open output fule \"%.100s\"", zLocalFile);
data/tkhtml1-1.04/tools/httpget.c:75:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&addr.sin_addr,pHost->h_addr_list[0],pHost->h_length);
data/tkhtml1-1.04/tools/httpget.c:86:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(zMsg,"can't open socket to %.100s", zIpAddr);
data/tkhtml1-1.04/tools/httpget.c:92:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(zMsg,"can't connect to host %.100s", zIpAddr);
data/tkhtml1-1.04/tools/httpget.c:162:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zLocation[300];
data/tkhtml1-1.04/tools/httpget.c:169:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      const char *az[2];
data/tkhtml1-1.04/tools/httpget.c:182:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(zActual, "%.*s", nActual, zUrl);
data/tkhtml1-1.04/tools/makeheaders.c:557:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(pDecl->zName,"%.*s",nName,zName);
data/tkhtml1-1.04/tools/makeheaders.c:590:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(pId->zName,"%.*s",nId,zId);
data/tkhtml1-1.04/tools/makeheaders.c:671:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  pIn = fopen(zFilename,"r");
data/tkhtml1-1.04/tools/makeheaders.c:688:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  pOut = fopen(zFilename,"w");
data/tkhtml1-1.04/tools/makeheaders.c:1862:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(pIf->zCondition,"%.*s",nText,zText);
data/tkhtml1-1.04/tools/makeheaders.c:1938:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(pDecl->zDecl,"%.*s\n",pToken->nText,pToken->zText);
data/tkhtml1-1.04/tools/makeheaders.c:1967:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(pInclude->zFile,"%.*s",nArg,zArg);
data/tkhtml1-1.04/tools/makeheaders.c:1974:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(pInclude->zFile,"%.*s",nArg,zArg);
data/tkhtml1-1.04/tools/makeheaders.c:2736:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zLabel[50];
data/tkhtml1-1.04/tools/makeheaders.c:2901:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[1000];        /* A single argument is accumulated here */
data/tkhtml1-1.04/tools/makeheaders.c:2905:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  in = fopen(zFile,"r");
data/tkhtml1-1.04/tools/sgmlparse.c:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *argv[100];
data/tkhtml1-1.04/tools/sgmlparse.c:67:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char zBuf[10000];
data/tkhtml1-1.04/tools/url.c:66:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(zResult, z, n);
data/tkhtml1-1.04/src/htmlcmd.c:386:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    htmlPtr->zHandler[type] = HtmlAlloc( strlen(argv[4]) + 1 );
data/tkhtml1-1.04/src/htmldraw.c:152:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(zBuf,".");
data/tkhtml1-1.04/src/htmldraw.c:212:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(zBuf,".");
data/tkhtml1-1.04/src/htmldraw.c:477:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            cnt = strlen(zBuf);
data/tkhtml1-1.04/src/htmldraw.c:558:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 src->image.zAlt, strlen(src->image.zAlt),
data/tkhtml1-1.04/src/htmldraw.c:818:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(p->z, zBuf, n);
data/tkhtml1-1.04/src/htmlexts.c:80:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        j=strlen(p->text.zText);
data/tkhtml1-1.04/src/htmlform.c:205:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen(Tk_PathName(htmlPtr->clipwin));
data/tkhtml1-1.04/src/htmlimage.c:189:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  lenSrc = strlen(zSrc);
data/tkhtml1-1.04/src/htmlimage.c:190:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  lenW = strlen(zWidth);
data/tkhtml1-1.04/src/htmlimage.c:191:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  lenH = strlen(zHeight);
data/tkhtml1-1.04/src/htmllayout.c:912:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      zl = strlen(z);
data/tkhtml1-1.04/src/htmlparse.c:660:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      pElem->base.count = strlen(pElem->text.zText);
data/tkhtml1-1.04/src/htmlparse.c:888:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = strlen(zText);
data/tkhtml1-1.04/src/htmlparse.c:949:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nByte += strlen(zType);
data/tkhtml1-1.04/src/htmlparse.c:974:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nByte += sizeof(char*)*(argc+1) + strlen(zArgs) + argc + 2;
data/tkhtml1-1.04/src/htmlparse.c:994:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      zBuf += strlen(argv[i]) + 1;
data/tkhtml1-1.04/src/htmlparse.c:1096:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sprintf(&zBuf[strlen(zBuf)]," %s=%s",
data/tkhtml1-1.04/src/htmlparse.c:1099:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(zBuf,">");
data/tkhtml1-1.04/src/htmlsizer.c:244:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  zCmd = HtmlAlloc( strlen(htmlPtr->zIsVisited) + strlen(zURL) + 10 );
data/tkhtml1-1.04/src/htmlsizer.c:244:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  zCmd = HtmlAlloc( strlen(htmlPtr->zIsVisited) + strlen(zURL) + 10 );
data/tkhtml1-1.04/src/htmlsizer.c:1122:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          p->image.w = Tk_TextWidth(font, p->image.zAlt, strlen(p->image.zAlt));
data/tkhtml1-1.04/src/htmltable.c:455:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen(z);
data/tkhtml1-1.04/src/htmlurl.c:87:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(z);
data/tkhtml1-1.04/src/htmlurl.c:160:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if( p->zScheme )    n += strlen(p->zScheme)+1;
data/tkhtml1-1.04/src/htmlurl.c:161:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if( p->zAuthority ) n += strlen(p->zAuthority)+2;
data/tkhtml1-1.04/src/htmlurl.c:162:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if( p->zPath )      n += strlen(p->zPath)+1;
data/tkhtml1-1.04/src/htmlurl.c:163:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if( p->zQuery )     n += strlen(p->zQuery)+1;
data/tkhtml1-1.04/src/htmlurl.c:164:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if( p->zFragment )  n += strlen(p->zFragment)+1;
data/tkhtml1-1.04/src/htmlurl.c:170:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(z);
data/tkhtml1-1.04/src/htmlurl.c:174:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n += strlen(&z[n]);
data/tkhtml1-1.04/src/htmlurl.c:178:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n += strlen(&z[n]);
data/tkhtml1-1.04/src/htmlurl.c:182:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n += strlen(&z[n]);
data/tkhtml1-1.04/src/htmlurl.c:212:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = strlen(z);
data/tkhtml1-1.04/src/htmlurl.c:314:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        zBuf = HtmlAlloc( strlen(base->zPath) + strlen(term->zPath) + 2 );
data/tkhtml1-1.04/src/htmlurl.c:314:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        zBuf = HtmlAlloc( strlen(base->zPath) + strlen(term->zPath) + 2 );
data/tkhtml1-1.04/src/htmlurl.c:317:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          for(i=strlen(zBuf)-1; i>=0 && zBuf[i]!='/'; i--){ zBuf[i] = 0; }
data/tkhtml1-1.04/src/htmlurl.c:323:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	      int ll = strlen(zBuf+i+3)+1;
data/tkhtml1-1.04/src/htmlurl.c:325:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	      strncpy(tmp,zBuf+i+3,ll);
data/tkhtml1-1.04/src/htmlurl.c:341:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int ll = strlen(zBuf+i+4)+1;
data/tkhtml1-1.04/src/htmlurl.c:343:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(tmp,zBuf+i+4,ll);
data/tkhtml1-1.04/src/htmlurl.c:358:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    int ll = strlen(zBuf+3)+1;
data/tkhtml1-1.04/src/htmlurl.c:360:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(tmp,zBuf+3,ll);
data/tkhtml1-1.04/src/htmlurl.c:395:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    zSrc = HtmlAlloc( strlen(Tcl_GetStringResult(htmlPtr->interp)) + 1 );
data/tkhtml1-1.04/src/htmlwidget.c:810:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(argv[i]);
data/tkhtml1-1.04/src/htmlwidget.c:1429:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen(zColor);
data/tkhtml1-1.04/src/htmlwidget.c:1792:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  length = strlen(argv[1]);
data/tkhtml1-1.04/src/htmlwidget.c:1808:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      length2 = strlen(argv[2]);
data/tkhtml1-1.04/src/htmlwidget.c:1882:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  n = strlen(z);
data/tkhtml1-1.04/src/htmlwidget.c:1900:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    zClipwin = HtmlAlloc( strlen(argv[1]) + 3 );
data/tkhtml1-1.04/src/htmlwidget.c:1913:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    htmlPtr = HtmlAlloc(sizeof(HtmlWidget) + strlen(argv[1]) + 1);
data/tkhtml1-1.04/tools/getpage.c:41:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  p = malloc( sizeof(*p) + strlen(zUrl) + 100 );
data/tkhtml1-1.04/tools/getpage.c:44:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  p->zLocal = &p->zUrl[strlen(zUrl)+1];
data/tkhtml1-1.04/tools/httpget.c:111:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while( (c=getc(sock))!=EOF && (c!='\n' || !last_was_nl) ){
data/tkhtml1-1.04/tools/httpget.c:137:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while( (c=getc(sock))!=EOF ){
data/tkhtml1-1.04/tools/makeheaders.c:398:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nByte = strlen(zSrc);
data/tkhtml1-1.04/tools/makeheaders.c:401:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(zDest,zSrc,nByte);
data/tkhtml1-1.04/tools/makeheaders.c:425:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nByte = strlen(zText);
data/tkhtml1-1.04/tools/makeheaders.c:436:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(&pStr->zText[pStr->nUsed],zText,nByte);
data/tkhtml1-1.04/tools/makeheaders.c:449:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(z);
data/tkhtml1-1.04/tools/makeheaders.c:468:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(zName);
data/tkhtml1-1.04/tools/makeheaders.c:579:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nId = strlen(zId);
data/tkhtml1-1.04/tools/makeheaders.c:612:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    nId = strlen(zId);
data/tkhtml1-1.04/tools/makeheaders.c:692:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  fwrite(zOutput,1,strlen(zOutput),pOut);
data/tkhtml1-1.04/tools/makeheaders.c:1852:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      nByte += strlen(zPrefix) + 2;
data/tkhtml1-1.04/tools/makeheaders.c:1964:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      pInclude = SafeMalloc( sizeof(Include) + nArg*2 + strlen(zIf) + 10 );
data/tkhtml1-1.04/tools/makeheaders.c:2034:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      PushIfMacro("!",pIf->zCondition,strlen(pIf->zCondition),pIf->nLine,0);
data/tkhtml1-1.04/tools/makeheaders.c:2649:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int n = strlen(z);
data/tkhtml1-1.04/tools/makeheaders.c:2752:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       (int)(pDecl->zIf ? strlen(pDecl->zIf)+1 : 0),
data/tkhtml1-1.04/tools/makeheaders.c:2753:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       (int)(zDecl ? strlen(zDecl) : 0),
data/tkhtml1-1.04/tools/makeheaders.c:2916:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = getc(in); 
data/tkhtml1-1.04/tools/makeheaders.c:2919:15:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          c = getc(in);
data/tkhtml1-1.04/tools/makeheaders.c:2927:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = getc(in);
data/tkhtml1-1.04/tools/sgmlparse.c:69:7:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  c = getc(in);
data/tkhtml1-1.04/tools/sgmlparse.c:75:37:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while( i<sizeof(zBuf)-2 && (c=getc(in))!=EOF && isspace(c) ){
data/tkhtml1-1.04/tools/sgmlparse.c:87:17:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while( (c=getc(in))!=EOF && (cQuote || c!='>') ){
data/tkhtml1-1.04/tools/sgmlparse.c:95:24:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if( c=='>' ) c = getc(in);
data/tkhtml1-1.04/tools/sgmlparse.c:151:37:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while( i<sizeof(zBuf)-2 && (c=getc(in))!=EOF && c!='<' && !isspace(c) ){
data/tkhtml1-1.04/tools/sgmlparse.c:185:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  Handler *pNew = malloc( sizeof(Handler) + strlen(zName) + 1 );
data/tkhtml1-1.04/tools/url.c:62:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(z);
data/tkhtml1-1.04/tools/url.c:132:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if( p->zScheme )    n += strlen(p->zScheme)+1;
data/tkhtml1-1.04/tools/url.c:133:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if( p->zAuthority ) n += strlen(p->zAuthority)+2;
data/tkhtml1-1.04/tools/url.c:134:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if( p->zPath )      n += strlen(p->zPath)+1;
data/tkhtml1-1.04/tools/url.c:135:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if( p->zQuery )     n += strlen(p->zQuery)+1;
data/tkhtml1-1.04/tools/url.c:136:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if( p->zFragment )  n += strlen(p->zFragment)+1;
data/tkhtml1-1.04/tools/url.c:142:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(z);
data/tkhtml1-1.04/tools/url.c:146:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n += strlen(&z[n]);
data/tkhtml1-1.04/tools/url.c:150:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n += strlen(&z[n]);
data/tkhtml1-1.04/tools/url.c:154:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n += strlen(&z[n]);
data/tkhtml1-1.04/tools/url.c:182:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  i = strlen(z);
data/tkhtml1-1.04/tools/url.c:229:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      zBuf = malloc( strlen(base->zPath) + strlen(term->zPath) + 2 );
data/tkhtml1-1.04/tools/url.c:229:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      zBuf = malloc( strlen(base->zPath) + strlen(term->zPath) + 2 );
data/tkhtml1-1.04/tools/url.c:232:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        for(i=strlen(zBuf)-1; i>=0 && zBuf[i]!='/'; i--){ zBuf[i] = 0; }

ANALYSIS SUMMARY:

Hits = 286
Lines analyzed = 22305 in approximately 0.70 seconds (31936 lines/second)
Physical Source Lines of Code (SLOC) = 17391
Hits@level = [0] 130 [1]  93 [2] 141 [3]   0 [4]  52 [5]   0
Hits@level+ = [0+] 416 [1+] 286 [2+] 193 [3+]  52 [4+]  52 [5+]   0
Hits/KSLOC@level+ = [0+] 23.9204 [1+] 16.4453 [2+] 11.0977 [3+] 2.99005 [4+] 2.99005 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.