Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/tokyotyrant-1.1.40/example/tcrdbex.c Examining data/tokyotyrant-1.1.40/example/tcrdbtblex.c Examining data/tokyotyrant-1.1.40/myconf.c Examining data/tokyotyrant-1.1.40/scrext.c Examining data/tokyotyrant-1.1.40/scrext.h Examining data/tokyotyrant-1.1.40/tcrdb.c Examining data/tokyotyrant-1.1.40/tcrdb.h Examining data/tokyotyrant-1.1.40/tcrmttest.c Examining data/tokyotyrant-1.1.40/tcrtest.c Examining data/tokyotyrant-1.1.40/tculog.c Examining data/tokyotyrant-1.1.40/tculog.h Examining data/tokyotyrant-1.1.40/ttskeldir.c Examining data/tokyotyrant-1.1.40/ttskelmock.c Examining data/tokyotyrant-1.1.40/ttskelnull.c Examining data/tokyotyrant-1.1.40/ttskelproxy.c Examining data/tokyotyrant-1.1.40/ttulmgr.c Examining data/tokyotyrant-1.1.40/ttultest.c Examining data/tokyotyrant-1.1.40/myconf.h Examining data/tokyotyrant-1.1.40/ttutil.h Examining data/tokyotyrant-1.1.40/ttutil.c Examining data/tokyotyrant-1.1.40/tcrmgr.c Examining data/tokyotyrant-1.1.40/ttserver.c FINAL RESULTS: data/tokyotyrant-1.1.40/tcrmttest.c:133:3: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(format, ap); data/tokyotyrant-1.1.40/tcrtest.c:106:3: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(format, ap); data/tokyotyrant-1.1.40/ttserver.c:2106:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. wp += sprintf(wp, "version\t%s\n", ttversion); data/tokyotyrant-1.1.40/ttserver.c:2108:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. wp += sprintf(wp, "protver\t%s\n", _TT_PROTVER); data/tokyotyrant-1.1.40/ttserver.c:2109:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. wp += sprintf(wp, "os\t%s\n", TTSYSNAME); data/tokyotyrant-1.1.40/ttserver.c:2124:20: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if(path) wp += sprintf(wp, "path\t%s\n", path); data/tokyotyrant-1.1.40/ttserver.c:2142:23: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if(fatal) wp += sprintf(wp, "fatal\t%s\n", emsg); data/tokyotyrant-1.1.40/ttserver.c:2148:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. wp += sprintf(wp, "mhost\t%s\n", sarg->host); data/tokyotyrant-1.1.40/ttserver.c:2159:22: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if(vbuf) wp += sprintf(wp, "memsize\t%s\n", vbuf); data/tokyotyrant-1.1.40/ttserver.c:2161:22: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if(vbuf) wp += sprintf(wp, "memrss\t%s\n", vbuf); data/tokyotyrant-1.1.40/ttserver.c:2163:22: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if(vbuf) wp += sprintf(wp, "ru_user\t%s\n", vbuf); data/tokyotyrant-1.1.40/ttserver.c:2165:22: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. if(vbuf) wp += sprintf(wp, "ru_sys\t%s\n", vbuf); data/tokyotyrant-1.1.40/ttserver.c:2846:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. wp += sprintf(wp, "STAT version %s\r\n", ttversion); data/tokyotyrant-1.1.40/ttserver.c:2928:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. len = sprintf(stack, "VERSION %s\r\n", ttversion); data/tokyotyrant-1.1.40/ttultest.c:82:3: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(format, ap); data/tokyotyrant-1.1.40/ttutil.c:396:20: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. tlen = sprintf(tbuf, cbuf, va_arg(ap, long long)); data/tokyotyrant-1.1.40/ttutil.c:398:20: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. tlen = sprintf(tbuf, cbuf, va_arg(ap, long)); data/tokyotyrant-1.1.40/ttutil.c:400:20: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. tlen = sprintf(tbuf, cbuf, va_arg(ap, int)); data/tokyotyrant-1.1.40/ttutil.c:406:20: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. tlen = sprintf(tbuf, cbuf, va_arg(ap, unsigned long long)); data/tokyotyrant-1.1.40/ttutil.c:408:20: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. tlen = sprintf(tbuf, cbuf, va_arg(ap, unsigned long)); data/tokyotyrant-1.1.40/ttutil.c:410:20: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. tlen = sprintf(tbuf, cbuf, va_arg(ap, unsigned int)); data/tokyotyrant-1.1.40/ttutil.c:416:20: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. tlen = sprintf(tbuf, cbuf, va_arg(ap, long double)); data/tokyotyrant-1.1.40/ttutil.c:418:20: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. tlen = sprintf(tbuf, cbuf, va_arg(ap, double)); data/tokyotyrant-1.1.40/ttutil.c:1208:3: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(buf, TTIOBUFSIZ, format, ap); data/tokyotyrant-1.1.40/tcrmttest.c:93:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned int)(tctime() * 1000) % UINT_MAX); data/tokyotyrant-1.1.40/tcrtest.c:56:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned int)(tctime() * 1000) % UINT_MAX); data/tokyotyrant-1.1.40/tcrtest.c:1165:32: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if(myrand(10000) == 0) srand((unsigned int)(tctime() * 1000) % UINT_MAX); data/tokyotyrant-1.1.40/ttultest.c:49:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((unsigned int)(tctime() * 1000) % UINT_MAX); data/tokyotyrant-1.1.40/example/tcrdbtblex.c:10:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pkbuf[256]; data/tokyotyrant-1.1.40/example/tcrdbtblex.c:26:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. pksiz = sprintf(pkbuf, "%ld", (long)tcrdbtblgenuid(rdb)); data/tokyotyrant-1.1.40/example/tcrdbtblex.c:35:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. pksiz = sprintf(pkbuf, "12345"); data/tokyotyrant-1.1.40/myconf.h:328:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((signed char *)(TT_buf))[0] = 0; \ data/tokyotyrant-1.1.40/myconf.h:336:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((signed char *)(TT_buf))[(TT_len)] = -_TT_rem - 1; \ data/tokyotyrant-1.1.40/myconf.h:338:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((signed char *)(TT_buf))[(TT_len)] = _TT_rem; \ data/tokyotyrant-1.1.40/myconf.h:350:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((signed char *)(TT_buf))[0] = 0; \ data/tokyotyrant-1.1.40/myconf.h:358:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((signed char *)(TT_buf))[(TT_len)] = -_TT_rem - 1; \ data/tokyotyrant-1.1.40/myconf.h:360:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((signed char *)(TT_buf))[(TT_len)] = _TT_rem; \ data/tokyotyrant-1.1.40/myconf.h:374:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. if(((signed char *)(TT_buf))[_TT_i] >= 0){ \ data/tokyotyrant-1.1.40/myconf.h:375:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. TT_num += ((signed char *)(TT_buf))[_TT_i] * _TT_base; \ data/tokyotyrant-1.1.40/myconf.h:378:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. TT_num += _TT_base * (((signed char *)(TT_buf))[_TT_i] + 1) * -1; \ data/tokyotyrant-1.1.40/myconf.h:392:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. if(((signed char *)(TT_buf))[_TT_i] >= 0){ \ data/tokyotyrant-1.1.40/myconf.h:393:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. TT_num += ((signed char *)(TT_buf))[_TT_i] * _TT_base; \ data/tokyotyrant-1.1.40/myconf.h:396:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. TT_num += _TT_base * (((signed char *)(TT_buf))[_TT_i] + 1) * -1; \ data/tokyotyrant-1.1.40/scrext.c:116:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, myscr->path, psiz); data/tokyotyrant-1.1.40/scrext.c:119:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, name, nsiz); data/tokyotyrant-1.1.40/scrext.c:122:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, kbuf, ksiz); data/tokyotyrant-1.1.40/scrext.c:125:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, vbuf, vsiz); data/tokyotyrant-1.1.40/scrext.c:1359:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char wbuf[TTNUMBUFSIZ], *wp; data/tokyotyrant-1.1.40/scrext.c:1842:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char obuf[48]; data/tokyotyrant-1.1.40/scrext.c:1847:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char obuf[48]; data/tokyotyrant-1.1.40/tcrdb.c:743:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char typestr[TTNUMBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:744:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(typestr, "%d", type); data/tokyotyrant-1.1.40/tcrdb.c:922:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[TTNUMBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:923:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(buf, "mstype"); data/tokyotyrant-1.1.40/tcrdb.c:924:14: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len += 1 + sprintf(buf + len + 1, "%d", type); data/tokyotyrant-1.1.40/tcrdb.c:1114:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[TTADDRBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:1191:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[TTADDRBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:1256:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:1264:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:1267:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:1269:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, kbuf, ksiz); data/tokyotyrant-1.1.40/tcrdb.c:1271:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, vbuf, vsiz); data/tokyotyrant-1.1.40/tcrdb.c:1305:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:1313:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:1316:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:1318:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, kbuf, ksiz); data/tokyotyrant-1.1.40/tcrdb.c:1320:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, vbuf, vsiz); data/tokyotyrant-1.1.40/tcrdb.c:1354:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:1362:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:1365:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:1367:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, kbuf, ksiz); data/tokyotyrant-1.1.40/tcrdb.c:1369:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, vbuf, vsiz); data/tokyotyrant-1.1.40/tcrdb.c:1405:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:1413:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:1416:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:1419:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:1421:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, kbuf, ksiz); data/tokyotyrant-1.1.40/tcrdb.c:1423:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, vbuf, vsiz); data/tokyotyrant-1.1.40/tcrdb.c:1457:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:1465:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:1468:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:1470:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, kbuf, ksiz); data/tokyotyrant-1.1.40/tcrdb.c:1472:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, vbuf, vsiz); data/tokyotyrant-1.1.40/tcrdb.c:1496:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:1504:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:1506:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, kbuf, ksiz); data/tokyotyrant-1.1.40/tcrdb.c:1541:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:1549:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:1551:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, kbuf, ksiz); data/tokyotyrant-1.1.40/tcrdb.c:1612:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:1669:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:1677:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:1679:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, kbuf, ksiz); data/tokyotyrant-1.1.40/tcrdb.c:1711:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:1744:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:1791:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:1799:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:1802:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:1804:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, pbuf, psiz); data/tokyotyrant-1.1.40/tcrdb.c:1854:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:1862:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:1865:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:1867:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, kbuf, ksiz); data/tokyotyrant-1.1.40/tcrdb.c:1903:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:1911:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:1913:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dbuf[sizeof(uint64_t)*2]; data/tokyotyrant-1.1.40/tcrdb.c:1916:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, kbuf, ksiz); data/tokyotyrant-1.1.40/tcrdb.c:1959:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:1967:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:1970:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:1973:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:1976:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:1978:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, name, nsiz); data/tokyotyrant-1.1.40/tcrdb.c:1980:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, kbuf, ksiz); data/tokyotyrant-1.1.40/tcrdb.c:1982:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, vbuf, vsiz); data/tokyotyrant-1.1.40/tcrdb.c:2023:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:2056:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:2064:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:2066:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, params, psiz); data/tokyotyrant-1.1.40/tcrdb.c:2095:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:2128:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:2136:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:2138:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, path, psiz); data/tokyotyrant-1.1.40/tcrdb.c:2172:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:2179:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:2182:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &llnum, sizeof(uint64_t)); data/tokyotyrant-1.1.40/tcrdb.c:2185:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:2187:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, path, psiz); data/tokyotyrant-1.1.40/tcrdb.c:2224:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:2232:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:2235:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:2239:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &llnum, sizeof(uint64_t)); data/tokyotyrant-1.1.40/tcrdb.c:2242:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(uint32_t)); data/tokyotyrant-1.1.40/tcrdb.c:2244:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, host, hsiz); data/tokyotyrant-1.1.40/tcrdb.c:2287:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:2321:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:2355:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrdb.c:2421:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrmgr.c:1372:22: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *ifp = file ? fopen(file, "rb") : stdin; data/tokyotyrant-1.1.40/tcrmgr.c:1488:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tcrmgr.c:1495:50: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. printf("%s\t", ttcmdidtostr(((unsigned char *)rbuf)[1])); data/tokyotyrant-1.1.40/tcrmgr.c:1508:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &llnum, sizeof(llnum)); data/tokyotyrant-1.1.40/tcrmgr.c:1511:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &snum, sizeof(snum)); data/tokyotyrant-1.1.40/tcrmgr.c:1514:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &snum, sizeof(snum)); data/tokyotyrant-1.1.40/tcrmgr.c:1517:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(lnum)); data/tokyotyrant-1.1.40/tcrmgr.c:1519:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, rbuf, rsiz); data/tokyotyrant-1.1.40/tcrmttest.c:688:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrmttest.c:689:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(buf, "%08d", base + (rnd ? myrand(i) + 1 : i)); data/tokyotyrant-1.1.40/tcrmttest.c:733:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrmttest.c:734:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int ksiz = sprintf(kbuf, "%08d", base + (rnd ? myrandnd(i) + 1 : i)); data/tokyotyrant-1.1.40/tcrmttest.c:775:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrmttest.c:776:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int ksiz = sprintf(kbuf, "%08d", base + (rnd ? myrandnd(i) + 1 : i)); data/tokyotyrant-1.1.40/tcrmttest.c:800:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrmttest.c:801:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int ksiz = sprintf(kbuf, "%d", myrand(range) + 1); data/tokyotyrant-1.1.40/tcrmttest.c:863:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pkbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrmttest.c:864:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int pksiz = sprintf(pkbuf, "%08d", base + (rnd ? myrand(rnum / 2 + i) : i)); data/tokyotyrant-1.1.40/tcrmttest.c:866:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vbuf[RECBUFSIZ*5]; data/tokyotyrant-1.1.40/tcrmttest.c:867:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int vsiz = sprintf(vbuf, "%d", myrand(i) + 1); data/tokyotyrant-1.1.40/tcrmttest.c:869:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. vsiz = sprintf(vbuf, "%lld", (long long)tctime() + (rnd ? myrand(3600) + 1 : 60)); data/tokyotyrant-1.1.40/tcrmttest.c:876:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(vbuf, "%d", myrand(i)); data/tokyotyrant-1.1.40/tcrmttest.c:879:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(vbuf, "%d,%d", myrand(rnum), myrand(rnum)); data/tokyotyrant-1.1.40/tcrtest.c:459:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrtest.c:460:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(buf, "%08d", rnd ? myrand(rnum) + 1 : i); data/tokyotyrant-1.1.40/tcrtest.c:514:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrtest.c:515:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int ksiz = sprintf(kbuf, "%08d", rnd ? myrand(rnum) + 1 : i); data/tokyotyrant-1.1.40/tcrtest.c:576:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrtest.c:577:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int ksiz = sprintf(kbuf, "%08d", rnd ? myrand(rnum) + 1 : i); data/tokyotyrant-1.1.40/tcrtest.c:624:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrtest.c:625:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int ksiz = sprintf(kbuf, "%d", myrand(pnum) + 1); data/tokyotyrant-1.1.40/tcrtest.c:703:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrtest.c:704:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(buf, "%08d", i); data/tokyotyrant-1.1.40/tcrtest.c:733:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrtest.c:734:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int ksiz = sprintf(kbuf, "%08d", i); data/tokyotyrant-1.1.40/tcrtest.c:760:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrtest.c:761:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int ksiz = sprintf(kbuf, "%d", myrand(rnum) + 1); data/tokyotyrant-1.1.40/tcrtest.c:762:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrtest.c:813:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrtest.c:814:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int ksiz = sprintf(kbuf, "%d", myrand(rnum)); data/tokyotyrant-1.1.40/tcrtest.c:828:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrtest.c:829:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int ksiz = sprintf(kbuf, "[%d]", i); data/tokyotyrant-1.1.40/tcrtest.c:830:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrtest.c:839:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tbuf[PATH_MAX]; data/tokyotyrant-1.1.40/tcrtest.c:858:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrtest.c:859:18: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int ksiz = sprintf(kbuf, "[%d]", i); data/tokyotyrant-1.1.40/tcrtest.c:879:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrtest.c:880:20: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int psiz = sprintf(pbuf, "%d", myrand(100) + 1); data/tokyotyrant-1.1.40/tcrtest.c:890:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrtest.c:891:22: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int ksiz = sprintf(kbuf, "%d", myrand(rnum) + 1); data/tokyotyrant-1.1.40/tcrtest.c:929:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrtest.c:930:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int ksiz = sprintf(kbuf, "(%d)", i); data/tokyotyrant-1.1.40/tcrtest.c:975:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrtest.c:976:18: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int ksiz = sprintf(kbuf, "(%d)", myrand(rnum)); data/tokyotyrant-1.1.40/tcrtest.c:1041:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrtest.c:1042:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int ksiz = sprintf(kbuf, "%d", myrand(rnum)); data/tokyotyrant-1.1.40/tcrtest.c:1043:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrtest.c:1178:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrtest.c:1179:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int ksiz = sprintf(kbuf, "%d", i - 1); data/tokyotyrant-1.1.40/tcrtest.c:1275:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pkbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrtest.c:1276:19: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int pksiz = sprintf(pkbuf, "%d", myrand(rnum) + 1); data/tokyotyrant-1.1.40/tcrtest.c:1280:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vbuf[RECBUFSIZ*5]; data/tokyotyrant-1.1.40/tcrtest.c:1281:20: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int vsiz = sprintf(vbuf, "%08d", i); data/tokyotyrant-1.1.40/tcrtest.c:1283:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. vsiz = sprintf(vbuf, "%d", (int)tctime() + exp); data/tokyotyrant-1.1.40/tcrtest.c:1338:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pkbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrtest.c:1339:19: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int pksiz = sprintf(pkbuf, "%d", id); data/tokyotyrant-1.1.40/tcrtest.c:1341:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vbuf[RECBUFSIZ*5]; data/tokyotyrant-1.1.40/tcrtest.c:1342:18: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int vsiz = sprintf(vbuf, "%d", id); data/tokyotyrant-1.1.40/tcrtest.c:1344:14: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. vsiz = sprintf(vbuf, "%d", myrand(i) + 1); data/tokyotyrant-1.1.40/tcrtest.c:1346:14: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. vsiz = sprintf(vbuf, "%d", myrand(32) + 1); data/tokyotyrant-1.1.40/tcrtest.c:1354:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "%d", pt); data/tokyotyrant-1.1.40/tcrtest.c:1390:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pkbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrtest.c:1391:19: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int pksiz = sprintf(pkbuf, "%d", myrand(rnum) + 1); data/tokyotyrant-1.1.40/tcrtest.c:1404:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pkbuf[RECBUFSIZ]; data/tokyotyrant-1.1.40/tcrtest.c:1405:19: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int pksiz = sprintf(pkbuf, "%d", myrand(rnum) + 1); data/tokyotyrant-1.1.40/tcrtest.c:1436:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expr[RECBUFSIZ*3]; data/tokyotyrant-1.1.40/tcrtest.c:1438:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(expr, "%d", myrand(i)); data/tokyotyrant-1.1.40/tcrtest.c:1439:35: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(myrand(10) == 0) wp += sprintf(wp, ",%d", myrand(i)); data/tokyotyrant-1.1.40/tcrtest.c:1440:35: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(myrand(10) == 0) wp += sprintf(wp, ",%d", myrand(i)); data/tokyotyrant-1.1.40/tculog.c:211:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = open(path, O_WRONLY | O_CREAT | O_APPEND, 00644); data/tokyotyrant-1.1.40/tculog.c:222:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tculog.c:228:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &llnum, sizeof(llnum)); data/tokyotyrant-1.1.40/tculog.c:231:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &snum, sizeof(snum)); data/tokyotyrant-1.1.40/tculog.c:234:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &snum, sizeof(snum)); data/tokyotyrant-1.1.40/tculog.c:237:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(lnum)); data/tokyotyrant-1.1.40/tculog.c:239:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, ptr, size); data/tokyotyrant-1.1.40/tculog.c:286:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = open(path, O_WRONLY | O_CREAT | O_APPEND, 00644); data/tokyotyrant-1.1.40/tculog.c:335:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = open(path, O_RDONLY, 00644); data/tokyotyrant-1.1.40/tculog.c:339:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[rsiz]; data/tokyotyrant-1.1.40/tculog.c:342:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&fts, buf + sizeof(uint8_t), sizeof(ts)); data/tokyotyrant-1.1.40/tculog.c:401:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ulrd->fd = open(path, O_RDONLY, 00644); data/tokyotyrant-1.1.40/tculog.c:409:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[rsiz]; data/tokyotyrant-1.1.40/tculog.c:426:20: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ulrd->fd = open(path, O_RDONLY, 00644); data/tokyotyrant-1.1.40/tculog.c:486:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char mstack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tculog.c:494:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(lnum)); data/tokyotyrant-1.1.40/tculog.c:497:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(lnum)); data/tokyotyrant-1.1.40/tculog.c:499:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, kbuf, ksiz); data/tokyotyrant-1.1.40/tculog.c:501:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, vbuf, vsiz); data/tokyotyrant-1.1.40/tculog.c:521:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char mstack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tculog.c:529:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(lnum)); data/tokyotyrant-1.1.40/tculog.c:532:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(lnum)); data/tokyotyrant-1.1.40/tculog.c:534:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, kbuf, ksiz); data/tokyotyrant-1.1.40/tculog.c:536:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, vbuf, vsiz); data/tokyotyrant-1.1.40/tculog.c:556:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char mstack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tculog.c:564:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(lnum)); data/tokyotyrant-1.1.40/tculog.c:567:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(lnum)); data/tokyotyrant-1.1.40/tculog.c:569:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, kbuf, ksiz); data/tokyotyrant-1.1.40/tculog.c:571:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, vbuf, vsiz); data/tokyotyrant-1.1.40/tculog.c:596:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char mstack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tculog.c:604:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(lnum)); data/tokyotyrant-1.1.40/tculog.c:607:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(lnum)); data/tokyotyrant-1.1.40/tculog.c:610:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(lnum)); data/tokyotyrant-1.1.40/tculog.c:612:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, kbuf, ksiz); data/tokyotyrant-1.1.40/tculog.c:614:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, vbuf, vsiz); data/tokyotyrant-1.1.40/tculog.c:634:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char mstack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tculog.c:642:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(lnum)); data/tokyotyrant-1.1.40/tculog.c:644:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, kbuf, ksiz); data/tokyotyrant-1.1.40/tculog.c:663:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char mstack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tculog.c:671:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(lnum)); data/tokyotyrant-1.1.40/tculog.c:674:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(lnum)); data/tokyotyrant-1.1.40/tculog.c:676:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, kbuf, ksiz); data/tokyotyrant-1.1.40/tculog.c:695:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char mstack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tculog.c:703:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(lnum)); data/tokyotyrant-1.1.40/tculog.c:707:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, kbuf, ksiz); data/tokyotyrant-1.1.40/tculog.c:725:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char mbuf[sizeof(uint8_t)*3]; data/tokyotyrant-1.1.40/tculog.c:745:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char mstack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tculog.c:753:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(lnum)); data/tokyotyrant-1.1.40/tculog.c:755:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, params, psiz); data/tokyotyrant-1.1.40/tculog.c:773:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char mbuf[sizeof(uint8_t)*3]; data/tokyotyrant-1.1.40/tculog.c:800:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char mstack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tculog.c:807:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(lnum)); data/tokyotyrant-1.1.40/tculog.c:810:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(lnum)); data/tokyotyrant-1.1.40/tculog.c:812:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, name, nsiz); data/tokyotyrant-1.1.40/tculog.c:818:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(lnum)); data/tokyotyrant-1.1.40/tculog.c:820:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, ebuf, esiz); data/tokyotyrant-1.1.40/tculog.c:875:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. bool exp = (((unsigned char *)ptr)[size-1] == 0) ? true : false; data/tokyotyrant-1.1.40/tculog.c:1079:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[TTADDRBUFSIZ]; data/tokyotyrant-1.1.40/tculog.c:1083:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/tculog.c:1088:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &llnum, sizeof(llnum)); data/tokyotyrant-1.1.40/tculog.c:1091:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(lnum)); data/tokyotyrant-1.1.40/tculog.c:1200:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, (char *)vbuf + vsiz - left, left); data/tokyotyrant-1.1.40/tculog.c:1204:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if(wsiz > 0) memcpy(wp, op->vbuf + op->vsiz - wsiz, wsiz); data/tokyotyrant-1.1.40/ttserver.c:84:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host[TTADDRBUFSIZ]; // host name data/tokyotyrant-1.1.40/ttserver.c:538:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = open(logpath, O_WRONLY | O_APPEND | O_CREAT, 00644); data/tokyotyrant-1.1.40/ttserver.c:549:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/tokyotyrant-1.1.40/ttserver.c:550:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%lld\n", (long long)pid); data/tokyotyrant-1.1.40/ttserver.c:596:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&initfunc, &initsym, sizeof(initsym)); data/tokyotyrant-1.1.40/ttserver.c:737:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = open(logpath, O_WRONLY | O_APPEND | O_CREAT, 00644); data/tokyotyrant-1.1.40/ttserver.c:810:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char date[48]; data/tokyotyrant-1.1.40/ttserver.c:819:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[LINEBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:838:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rtsbuf[NUMBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:839:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(rtsbuf, "%llu\n", (unsigned long long)arg->mts); data/tokyotyrant-1.1.40/ttserver.c:844:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int rtsfd = open(arg->rtspath, O_RDWR | O_CREAT, 00644); data/tokyotyrant-1.1.40/ttserver.c:855:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rtsbuf[NUMBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:889:19: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(rtsbuf, "%llu\n", (unsigned long long)rts); data/tokyotyrant-1.1.40/ttserver.c:1139:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:1179:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:1218:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:1260:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:1300:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:1334:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:1369:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:1389:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rbuf + sizeof(uint8_t), &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/ttserver.c:1390:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rbuf + sizeof(uint8_t) + sizeof(uint32_t), vbuf, vsiz); data/tokyotyrant-1.1.40/ttserver.c:1427:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:1465:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)tcxstrptr(xstr) + sizeof(code), &num, sizeof(num)); data/tokyotyrant-1.1.40/ttserver.c:1490:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:1505:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stack + sizeof(uint8_t), &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/ttserver.c:1565:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:1571:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rbuf + sizeof(uint8_t), &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/ttserver.c:1572:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rbuf + sizeof(uint8_t) + sizeof(uint32_t), vbuf, vsiz); data/tokyotyrant-1.1.40/ttserver.c:1603:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:1629:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)tcxstrptr(xstr) + sizeof(code), &num, sizeof(num)); data/tokyotyrant-1.1.40/ttserver.c:1658:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:1673:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stack + sizeof(uint8_t), &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/ttserver.c:1703:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char abuf[sizeof(uint64_t)*2]; data/tokyotyrant-1.1.40/ttserver.c:1710:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:1724:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stack + sizeof(uint8_t), abuf, sizeof(abuf)); data/tokyotyrant-1.1.40/ttserver.c:1762:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:1766:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[TTADDRBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:1767:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name, buf, nsiz); data/tokyotyrant-1.1.40/ttserver.c:1815:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rbuf + sizeof(uint8_t), &num, sizeof(uint32_t)); data/tokyotyrant-1.1.40/ttserver.c:1816:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rbuf + sizeof(uint8_t) + sizeof(uint32_t), xbuf, xsiz); data/tokyotyrant-1.1.40/ttserver.c:1876:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:1935:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:1974:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:2014:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:2049:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[LINEBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:2059:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + sizeof(uint8_t), &rnum, sizeof(uint64_t)); data/tokyotyrant-1.1.40/ttserver.c:2074:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[LINEBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:2084:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + sizeof(uint8_t), &size, sizeof(uint64_t)); data/tokyotyrant-1.1.40/ttserver.c:2100:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:2107:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "libver\t%d\n", _TT_LIBVER); data/tokyotyrant-1.1.40/ttserver.c:2110:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "time\t%.6f\n", now); data/tokyotyrant-1.1.40/ttserver.c:2111:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "pid\t%lld\n", (long long)getpid()); data/tokyotyrant-1.1.40/ttserver.c:2112:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "sid\t%d\n", arg->sid); data/tokyotyrant-1.1.40/ttserver.c:2114:28: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case ADBOVOID: wp += sprintf(wp, "type\tvoid\n"); break; data/tokyotyrant-1.1.40/ttserver.c:2115:27: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case ADBOMDB: wp += sprintf(wp, "type\ton-memory hash\n"); break; data/tokyotyrant-1.1.40/ttserver.c:2116:27: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case ADBONDB: wp += sprintf(wp, "type\ton-memory tree\n"); break; data/tokyotyrant-1.1.40/ttserver.c:2117:27: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case ADBOHDB: wp += sprintf(wp, "type\thash\n"); break; data/tokyotyrant-1.1.40/ttserver.c:2118:27: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case ADBOBDB: wp += sprintf(wp, "type\tB+ tree\n"); break; data/tokyotyrant-1.1.40/ttserver.c:2119:27: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case ADBOFDB: wp += sprintf(wp, "type\tfixed-length\n"); break; data/tokyotyrant-1.1.40/ttserver.c:2120:27: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case ADBOTDB: wp += sprintf(wp, "type\ttable\n"); break; data/tokyotyrant-1.1.40/ttserver.c:2121:28: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. case ADBOSKEL: wp += sprintf(wp, "type\tskeleton\n"); break; data/tokyotyrant-1.1.40/ttserver.c:2125:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "rnum\t%llu\n", (unsigned long long)tcadbrnum(adb)); data/tokyotyrant-1.1.40/ttserver.c:2126:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "size\t%llu\n", (unsigned long long)tcadbsize(adb)); data/tokyotyrant-1.1.40/ttserver.c:2146:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "bigend\t%d\n", TTBIGEND); data/tokyotyrant-1.1.40/ttserver.c:2149:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "mport\t%d\n", sarg->port); data/tokyotyrant-1.1.40/ttserver.c:2150:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "rts\t%llu\n", (unsigned long long)sarg->rts); data/tokyotyrant-1.1.40/ttserver.c:2152:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "delay\t%.6f\n", delay >= 0 ? delay : 0.0); data/tokyotyrant-1.1.40/ttserver.c:2154:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "fd\t%d\n", sock->fd); data/tokyotyrant-1.1.40/ttserver.c:2155:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "loadavg\t%.6f\n", ttgetloadavg()); data/tokyotyrant-1.1.40/ttserver.c:2168:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "ru_real\t%.6f\n", now - g_starttime); data/tokyotyrant-1.1.40/ttserver.c:2170:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_put\t%llu\n", (unsigned long long)sumstat(arg, TTSEQPUT)); data/tokyotyrant-1.1.40/ttserver.c:2171:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_putkeep\t%llu\n", (unsigned long long)sumstat(arg, TTSEQPUTKEEP)); data/tokyotyrant-1.1.40/ttserver.c:2172:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_putcat\t%llu\n", (unsigned long long)sumstat(arg, TTSEQPUTCAT)); data/tokyotyrant-1.1.40/ttserver.c:2173:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_putshl\t%llu\n", (unsigned long long)sumstat(arg, TTSEQPUTSHL)); data/tokyotyrant-1.1.40/ttserver.c:2174:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_putnr\t%llu\n", (unsigned long long)sumstat(arg, TTSEQPUTNR)); data/tokyotyrant-1.1.40/ttserver.c:2175:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_out\t%llu\n", (unsigned long long)sumstat(arg, TTSEQOUT)); data/tokyotyrant-1.1.40/ttserver.c:2176:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_get\t%llu\n", (unsigned long long)sumstat(arg, TTSEQGET)); data/tokyotyrant-1.1.40/ttserver.c:2177:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_mget\t%llu\n", (unsigned long long)sumstat(arg, TTSEQMGET)); data/tokyotyrant-1.1.40/ttserver.c:2178:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_vsiz\t%llu\n", (unsigned long long)sumstat(arg, TTSEQVSIZ)); data/tokyotyrant-1.1.40/ttserver.c:2179:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_iterinit\t%llu\n", (unsigned long long)sumstat(arg, TTSEQITERINIT)); data/tokyotyrant-1.1.40/ttserver.c:2180:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_iternext\t%llu\n", (unsigned long long)sumstat(arg, TTSEQITERNEXT)); data/tokyotyrant-1.1.40/ttserver.c:2181:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_fwmkeys\t%llu\n", (unsigned long long)sumstat(arg, TTSEQFWMKEYS)); data/tokyotyrant-1.1.40/ttserver.c:2182:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_addint\t%llu\n", (unsigned long long)sumstat(arg, TTSEQADDINT)); data/tokyotyrant-1.1.40/ttserver.c:2183:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_adddouble\t%llu\n", (unsigned long long)sumstat(arg, TTSEQADDDOUBLE)); data/tokyotyrant-1.1.40/ttserver.c:2184:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_ext\t%llu\n", (unsigned long long)sumstat(arg, TTSEQEXT)); data/tokyotyrant-1.1.40/ttserver.c:2185:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_sync\t%llu\n", (unsigned long long)sumstat(arg, TTSEQSYNC)); data/tokyotyrant-1.1.40/ttserver.c:2186:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_optimize\t%llu\n", (unsigned long long)sumstat(arg, TTSEQOPTIMIZE)); data/tokyotyrant-1.1.40/ttserver.c:2187:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_vanish\t%llu\n", (unsigned long long)sumstat(arg, TTSEQVANISH)); data/tokyotyrant-1.1.40/ttserver.c:2188:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_copy\t%llu\n", (unsigned long long)sumstat(arg, TTSEQCOPY)); data/tokyotyrant-1.1.40/ttserver.c:2189:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_restore\t%llu\n", (unsigned long long)sumstat(arg, TTSEQRESTORE)); data/tokyotyrant-1.1.40/ttserver.c:2190:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_setmst\t%llu\n", (unsigned long long)sumstat(arg, TTSEQSETMST)); data/tokyotyrant-1.1.40/ttserver.c:2191:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_rnum\t%llu\n", (unsigned long long)sumstat(arg, TTSEQRNUM)); data/tokyotyrant-1.1.40/ttserver.c:2192:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_size\t%llu\n", (unsigned long long)sumstat(arg, TTSEQSIZE)); data/tokyotyrant-1.1.40/ttserver.c:2193:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_stat\t%llu\n", (unsigned long long)sumstat(arg, TTSEQSTAT)); data/tokyotyrant-1.1.40/ttserver.c:2194:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_misc\t%llu\n", (unsigned long long)sumstat(arg, TTSEQMISC)); data/tokyotyrant-1.1.40/ttserver.c:2195:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_repl\t%llu\n", (unsigned long long)sumstat(arg, TTSEQREPL)); data/tokyotyrant-1.1.40/ttserver.c:2196:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_put_miss\t%llu\n", (unsigned long long)sumstat(arg, TTSEQPUTMISS)); data/tokyotyrant-1.1.40/ttserver.c:2197:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_out_miss\t%llu\n", (unsigned long long)sumstat(arg, TTSEQOUTMISS)); data/tokyotyrant-1.1.40/ttserver.c:2198:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "cnt_get_miss\t%llu\n", (unsigned long long)sumstat(arg, TTSEQGETMISS)); data/tokyotyrant-1.1.40/ttserver.c:2202:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + sizeof(uint8_t), &size, sizeof(uint32_t)); data/tokyotyrant-1.1.40/ttserver.c:2226:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[TTADDRBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:2234:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:2271:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)tcxstrptr(xstr) + sizeof(code), &num, sizeof(num)); data/tokyotyrant-1.1.40/ttserver.c:2317:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:2357:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &llnum, sizeof(llnum)); data/tokyotyrant-1.1.40/ttserver.c:2360:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(lnum)); data/tokyotyrant-1.1.40/ttserver.c:2363:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, &lnum, sizeof(lnum)); data/tokyotyrant-1.1.40/ttserver.c:2365:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wp, rbuf, rsiz); data/tokyotyrant-1.1.40/ttserver.c:2396:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:2403:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "CLIENT_ERROR forbidden\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2406:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "STORED\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2409:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "SERVER_ERROR unexpected\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2440:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:2447:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "CLIENT_ERROR forbidden\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2450:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "STORED\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2453:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "NOT_STORED\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2485:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:2492:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "CLIENT_ERROR forbidden\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2496:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "SERVER_ERROR unexpected\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2500:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "STORED\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2502:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "SERVER_ERROR unexpected\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2507:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "NOT_STORED\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2542:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:2549:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "CLIENT_ERROR forbidden\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2553:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "SERVER_ERROR unexpected\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2557:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "STORED\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2559:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "SERVER_ERROR unexpected\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2564:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "NOT_STORED\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2599:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:2606:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "CLIENT_ERROR forbidden\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2612:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "SERVER_ERROR unexpected\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2616:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nbuf, vbuf, vsiz); data/tokyotyrant-1.1.40/ttserver.c:2617:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nbuf + vsiz, obuf, osiz); data/tokyotyrant-1.1.40/ttserver.c:2619:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "STORED\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2624:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "NOT_STORED\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2700:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:2703:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "CLIENT_ERROR forbidden\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2706:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "DELETED\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2709:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "NOT_FOUND\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2737:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:2740:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "CLIENT_ERROR forbidden\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2753:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "%lld", (long long)num); data/tokyotyrant-1.1.40/ttserver.c:2755:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "%lld\r\n", (long long)num); data/tokyotyrant-1.1.40/ttserver.c:2757:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "SERVER_ERROR unexpected\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2762:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "NOT_FOUND\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2793:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:2796:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "CLIENT_ERROR forbidden\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2809:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "%lld", (long long)num); data/tokyotyrant-1.1.40/ttserver.c:2811:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "%lld\r\n", (long long)num); data/tokyotyrant-1.1.40/ttserver.c:2813:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "SERVER_ERROR unexpected\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2818:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "NOT_FOUND\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2837:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:2842:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "STAT pid %lld\r\n", (long long)getpid()); data/tokyotyrant-1.1.40/ttserver.c:2844:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "STAT uptime %lld\r\n", (long long)(now - (int)g_starttime)); data/tokyotyrant-1.1.40/ttserver.c:2845:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "STAT time %lld\r\n", (long long)now); data/tokyotyrant-1.1.40/ttserver.c:2847:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "STAT pointer_size %d\r\n", (int)sizeof(void *) * 8); data/tokyotyrant-1.1.40/ttserver.c:2851:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "STAT rusage_user %d.%06d\r\n", data/tokyotyrant-1.1.40/ttserver.c:2853:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "STAT rusage_system %d.%06d\r\n", data/tokyotyrant-1.1.40/ttserver.c:2859:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "STAT cmd_set %llu\r\n", (unsigned long long)putsum); data/tokyotyrant-1.1.40/ttserver.c:2860:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "STAT cmd_set_hits %llu\r\n", (unsigned long long)(putsum - putmiss)); data/tokyotyrant-1.1.40/ttserver.c:2861:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "STAT cmd_set_misses %llu\r\n", (unsigned long long)putmiss); data/tokyotyrant-1.1.40/ttserver.c:2864:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "STAT cmd_delete %llu\r\n", (unsigned long long)outsum); data/tokyotyrant-1.1.40/ttserver.c:2865:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "STAT cmd_delete_hits %llu\r\n", (unsigned long long)(outsum - outmiss)); data/tokyotyrant-1.1.40/ttserver.c:2866:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "STAT cmd_delete_misses %llu\r\n", (unsigned long long)outmiss); data/tokyotyrant-1.1.40/ttserver.c:2869:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "STAT cmd_get %llu\r\n", (unsigned long long)getsum); data/tokyotyrant-1.1.40/ttserver.c:2870:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "STAT cmd_get_hits %llu\r\n", (unsigned long long)(getsum - getmiss)); data/tokyotyrant-1.1.40/ttserver.c:2871:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "STAT cmd_get_misses %llu\r\n", (unsigned long long)getmiss); data/tokyotyrant-1.1.40/ttserver.c:2872:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "STAT cmd_flush %llu\r\n", (unsigned long long)sumstat(arg, TTSEQVANISH)); data/tokyotyrant-1.1.40/ttserver.c:2874:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "STAT curr_items %lld\r\n", (long long)rnum); data/tokyotyrant-1.1.40/ttserver.c:2875:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "STAT total_items %lld\r\n", (long long)rnum); data/tokyotyrant-1.1.40/ttserver.c:2876:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "STAT bytes %lld\r\n", (long long)tcadbsize(adb)); data/tokyotyrant-1.1.40/ttserver.c:2877:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "STAT threads %d\r\n", arg->thnum); data/tokyotyrant-1.1.40/ttserver.c:2878:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. wp += sprintf(wp, "END\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2898:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:2901:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "CLIENT_ERROR forbidden\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2904:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "OK\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2906:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "SERVER_ERROR unexpected\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2922:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:2925:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf(stack, "CLIENT_ERROR forbidden\r\n"); data/tokyotyrant-1.1.40/ttserver.c:2951:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[LINEBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:2974:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(line, "Forbidden\n"); data/tokyotyrant-1.1.40/ttserver.c:2993:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(line, "Not Found\n"); data/tokyotyrant-1.1.40/ttserver.c:3018:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[LINEBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:3077:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[LINEBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:3101:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:3108:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(line, "Forbidden\n"); data/tokyotyrant-1.1.40/ttserver.c:3119:23: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(line, "Created\n"); data/tokyotyrant-1.1.40/ttserver.c:3127:23: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(line, "Conflict\n"); data/tokyotyrant-1.1.40/ttserver.c:3137:23: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(line, "Created\n"); data/tokyotyrant-1.1.40/ttserver.c:3145:23: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(line, "Internal Server Error\n"); data/tokyotyrant-1.1.40/ttserver.c:3156:23: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(line, "Created\n"); data/tokyotyrant-1.1.40/ttserver.c:3164:23: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(line, "Internal Server Error\n"); data/tokyotyrant-1.1.40/ttserver.c:3200:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ctype[LINEBUFSIZ/4+1]; data/tokyotyrant-1.1.40/ttserver.c:3202:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char xname[LINEBUFSIZ/4+1]; data/tokyotyrant-1.1.40/ttserver.c:3204:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mname[LINEBUFSIZ/4+1]; data/tokyotyrant-1.1.40/ttserver.c:3208:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[LINEBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:3243:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:3251:19: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(line, "Forbidden\n"); data/tokyotyrant-1.1.40/ttserver.c:3302:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(line, "Internal Server Error\n"); data/tokyotyrant-1.1.40/ttserver.c:3312:19: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(line, "Forbidden\n"); data/tokyotyrant-1.1.40/ttserver.c:3346:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(line, "Internal Server Error\n"); data/tokyotyrant-1.1.40/ttserver.c:3357:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(line, "Bad Request\n"); data/tokyotyrant-1.1.40/ttserver.c:3388:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[LINEBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:3411:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(line, "Forbidden\n"); data/tokyotyrant-1.1.40/ttserver.c:3420:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(line, "OK\n"); data/tokyotyrant-1.1.40/ttserver.c:3428:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(line, "Not Found\n"); data/tokyotyrant-1.1.40/ttserver.c:3454:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[LINEBUFSIZ]; data/tokyotyrant-1.1.40/ttserver.c:3473:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(line, "Forbidden\n"); data/tokyotyrant-1.1.40/ttulmgr.c:188:48: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. printf("%s\t", ttcmdidtostr(((unsigned char *)rbuf)[1])); data/tokyotyrant-1.1.40/ttultest.c:206:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[RECBUFSIZ]; data/tokyotyrant-1.1.40/ttultest.c:207:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(buf, "%08d", i); data/tokyotyrant-1.1.40/ttultest.c:253:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. printf("%02X", ((unsigned char *)rbuf)[i]); data/tokyotyrant-1.1.40/ttultest.c:339:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[RECBUFSIZ]; data/tokyotyrant-1.1.40/ttultest.c:340:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. int len = sprintf(buf, "%08d", i); data/tokyotyrant-1.1.40/ttutil.c:45:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "localhost"); data/tokyotyrant-1.1.40/ttutil.c:225:55: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. NULL, 0, NI_NUMERICHOST) != 0) sprintf(addr, "0.0.0.0"); data/tokyotyrant-1.1.40/ttutil.c:374:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cbuf[TTNUMBUFSIZ]; data/tokyotyrant-1.1.40/ttutil.c:387:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tmp, tbuf[TTNUMBUFSIZ*2]; data/tokyotyrant-1.1.40/ttutil.c:448:22: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. tlen = sprintf(tbuf, "%%%02X", c); data/tokyotyrant-1.1.40/ttutil.c:474:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, sock->rp, size); data/tokyotyrant-1.1.40/ttutil.c:633:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[TTADDRBUFSIZ]; data/tokyotyrant-1.1.40/ttutil.c:683:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[SOCKLINEBUFSIZ]; data/tokyotyrant-1.1.40/ttutil.c:814:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, &linteg, sizeof(linteg)); data/tokyotyrant-1.1.40/ttutil.c:816:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + sizeof(linteg), &lfract, sizeof(lfract)); data/tokyotyrant-1.1.40/ttutil.c:1031:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[TTADDRBUFSIZ]; data/tokyotyrant-1.1.40/ttutil.c:1036:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(addr, "(unix)"); data/tokyotyrant-1.1.40/ttutil.c:1205:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[TTIOBUFSIZ]; data/tokyotyrant-1.1.40/ttutil.c:1445:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = open(NULLDEV, O_RDWR, 0); data/tokyotyrant-1.1.40/ttutil.h:50:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[TTIOBUFSIZ]; /* reading buffer */ data/tokyotyrant-1.1.40/ttutil.h:324:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host[TTADDRBUFSIZ]; /* host name */ data/tokyotyrant-1.1.40/ttutil.h:325:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[TTADDRBUFSIZ]; /* host address */ data/tokyotyrant-1.1.40/scrext.c:83:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *sp = strlen(msg); data/tokyotyrant-1.1.40/scrext.c:89:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *sp = strlen(msg); data/tokyotyrant-1.1.40/scrext.c:95:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *sp = strlen(msg); data/tokyotyrant-1.1.40/scrext.c:100:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *sp = strlen(msg); data/tokyotyrant-1.1.40/scrext.c:109:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *sp = strlen(msg); data/tokyotyrant-1.1.40/scrext.c:112:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int psiz = strlen(myscr->path); data/tokyotyrant-1.1.40/scrext.c:113:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nsiz = strlen(name); data/tokyotyrant-1.1.40/scrext.c:245:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). isiz = strlen(ibuf); data/tokyotyrant-1.1.40/scrext.c:388:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rsiz = strlen(rbuf); data/tokyotyrant-1.1.40/scrext.c:402:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rsiz = strlen(rbuf); data/tokyotyrant-1.1.40/scrext.c:1786:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). osiz = obuf ? strlen(obuf) : 0; data/tokyotyrant-1.1.40/scrext.c:1791:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). osiz = obuf ? strlen(obuf) : 0; data/tokyotyrant-1.1.40/scrext.c:1794:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). osiz = obuf ? strlen(obuf) : 0; data/tokyotyrant-1.1.40/scrext.c:1797:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). osiz = obuf ? strlen(obuf) : 0; data/tokyotyrant-1.1.40/scrext.c:1800:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). osiz = obuf ? strlen(obuf) : 0; data/tokyotyrant-1.1.40/scrext.c:1813:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). osiz = obuf ? strlen(obuf) : 0; data/tokyotyrant-1.1.40/scrext.c:1917:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int plen = strlen(pat); data/tokyotyrant-1.1.40/scrext.c:1918:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int alen = strlen(alt); data/tokyotyrant-1.1.40/tcrdb.c:231:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return tcrdbput(rdb, kstr, strlen(kstr), vstr, strlen(vstr)); data/tokyotyrant-1.1.40/tcrdb.c:231:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return tcrdbput(rdb, kstr, strlen(kstr), vstr, strlen(vstr)); data/tokyotyrant-1.1.40/tcrdb.c:250:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return tcrdbputkeep(rdb, kstr, strlen(kstr), vstr, strlen(vstr)); data/tokyotyrant-1.1.40/tcrdb.c:250:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return tcrdbputkeep(rdb, kstr, strlen(kstr), vstr, strlen(vstr)); data/tokyotyrant-1.1.40/tcrdb.c:269:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return tcrdbputcat(rdb, kstr, strlen(kstr), vstr, strlen(vstr)); data/tokyotyrant-1.1.40/tcrdb.c:269:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return tcrdbputcat(rdb, kstr, strlen(kstr), vstr, strlen(vstr)); data/tokyotyrant-1.1.40/tcrdb.c:288:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return tcrdbputshl(rdb, kstr, strlen(kstr), vstr, strlen(vstr), width); data/tokyotyrant-1.1.40/tcrdb.c:288:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return tcrdbputshl(rdb, kstr, strlen(kstr), vstr, strlen(vstr), width); data/tokyotyrant-1.1.40/tcrdb.c:307:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return tcrdbputnr(rdb, kstr, strlen(kstr), vstr, strlen(vstr)); data/tokyotyrant-1.1.40/tcrdb.c:307:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return tcrdbputnr(rdb, kstr, strlen(kstr), vstr, strlen(vstr)); data/tokyotyrant-1.1.40/tcrdb.c:326:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return tcrdbout(rdb, kstr, strlen(kstr)); data/tokyotyrant-1.1.40/tcrdb.c:346:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return tcrdbget(rdb, kstr, strlen(kstr), &vsiz); data/tokyotyrant-1.1.40/tcrdb.c:377:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return tcrdbvsiz(rdb, kstr, strlen(kstr)); data/tokyotyrant-1.1.40/tcrdb.c:428:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return tcrdbfwmkeys(rdb, pstr, strlen(pstr), max); data/tokyotyrant-1.1.40/tcrdb.c:473:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return tcrdbext(rdb, name, opts, kstr, strlen(kstr), vstr, strlen(vstr), &vsiz); data/tokyotyrant-1.1.40/tcrdb.c:473:62: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return tcrdbext(rdb, name, opts, kstr, strlen(kstr), vstr, strlen(vstr), &vsiz); data/tokyotyrant-1.1.40/tcrdb.c:964:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int onsiz = oname ? strlen(oname) : 0; data/tokyotyrant-1.1.40/tcrdb.c:1957:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nsiz = strlen(name); data/tokyotyrant-1.1.40/tcrdb.c:2053:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int psiz = strlen(params); data/tokyotyrant-1.1.40/tcrdb.c:2126:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int psiz = strlen(path); data/tokyotyrant-1.1.40/tcrdb.c:2170:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int psiz = strlen(path); data/tokyotyrant-1.1.40/tcrdb.c:2222:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int hsiz = strlen(host); data/tokyotyrant-1.1.40/tcrdb.c:2404:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nsiz = strlen(name); data/tokyotyrant-1.1.40/tcrmgr.c:185:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int size = strlen(str); data/tokyotyrant-1.1.40/tcrmgr.c:226:14: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while((c = fgetc(ifp)) != EOF){ data/tokyotyrant-1.1.40/tcrmgr.c:351:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ksiz = strlen(key); data/tokyotyrant-1.1.40/tcrmgr.c:353:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vsiz = strlen(value); data/tokyotyrant-1.1.40/tcrmgr.c:399:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ksiz = strlen(key); data/tokyotyrant-1.1.40/tcrmgr.c:450:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ksiz = strlen(key); data/tokyotyrant-1.1.40/tcrmgr.c:608:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ksiz = strlen(key); data/tokyotyrant-1.1.40/tcrmgr.c:610:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vsiz = strlen(value); data/tokyotyrant-1.1.40/tcrmgr.c:1400:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vsiz = strlen(pv + 1); data/tokyotyrant-1.1.40/tcrtest.c:800:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int ksiz = strlen(kbuf); data/tokyotyrant-1.1.40/tcrtest.c:802:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int vsiz = strlen(vbuf); data/tokyotyrant-1.1.40/tculog.c:744:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int psiz = strlen(params); data/tokyotyrant-1.1.40/tculog.c:792:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nsiz = strlen(name); data/tokyotyrant-1.1.40/ttserver.c:551:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(!tcwritefile(pidpath, buf, strlen(buf))){ data/tokyotyrant-1.1.40/ttserver.c:2394:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int ksiz = strlen(kbuf); data/tokyotyrant-1.1.40/ttserver.c:2438:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int ksiz = strlen(kbuf); data/tokyotyrant-1.1.40/ttserver.c:2482:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int ksiz = strlen(kbuf); data/tokyotyrant-1.1.40/ttserver.c:2539:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int ksiz = strlen(kbuf); data/tokyotyrant-1.1.40/ttserver.c:2596:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int ksiz = strlen(kbuf); data/tokyotyrant-1.1.40/ttserver.c:2655:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int ksiz = strlen(kbuf); data/tokyotyrant-1.1.40/ttserver.c:2699:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int ksiz = strlen(kbuf); data/tokyotyrant-1.1.40/ttserver.c:2734:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int ksiz = strlen(kbuf); data/tokyotyrant-1.1.40/ttserver.c:2790:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int ksiz = strlen(kbuf); data/tokyotyrant-1.1.40/ttulmgr.c:98:14: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while((c = fgetc(ifp)) != EOF){ data/tokyotyrant-1.1.40/ttutil.c:653:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *enc = tcbaseencode(authority, strlen(authority)); data/tokyotyrant-1.1.40/ttutil.c:1440:3: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(0); ANALYSIS SUMMARY: Hits = 579 Lines analyzed = 18866 in approximately 0.61 seconds (30817 lines/second) Physical Source Lines of Code (SLOC) = 15336 Hits@level = [0] 117 [1] 67 [2] 484 [3] 4 [4] 24 [5] 0 Hits@level+ = [0+] 696 [1+] 579 [2+] 512 [3+] 28 [4+] 24 [5+] 0 Hits/KSLOC@level+ = [0+] 45.3834 [1+] 37.7543 [2+] 33.3855 [3+] 1.82577 [4+] 1.56495 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.