Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/unzip-6.0/api.c
Examining data/unzip-6.0/apihelp.c
Examining data/unzip-6.0/consts.h
Examining data/unzip-6.0/crc32.c
Examining data/unzip-6.0/crc32.h
Examining data/unzip-6.0/crypt.h
Examining data/unzip-6.0/ebcdic.h
Examining data/unzip-6.0/envargs.c
Examining data/unzip-6.0/explode.c
Examining data/unzip-6.0/funzip.c
Examining data/unzip-6.0/gbloffs.c
Examining data/unzip-6.0/inflate.c
Examining data/unzip-6.0/inflate.h
Examining data/unzip-6.0/match.c
Examining data/unzip-6.0/timezone.c
Examining data/unzip-6.0/timezone.h
Examining data/unzip-6.0/ttyio.c
Examining data/unzip-6.0/ttyio.h
Examining data/unzip-6.0/ubz2err.c
Examining data/unzip-6.0/unreduce.c
Examining data/unzip-6.0/unshrink.c
Examining data/unzip-6.0/unzipstb.c
Examining data/unzip-6.0/unzvers.h
Examining data/unzip-6.0/zip.h
Examining data/unzip-6.0/acorn/acorn.c
Examining data/unzip-6.0/acorn/riscos.c
Examining data/unzip-6.0/acorn/riscos.h
Examining data/unzip-6.0/acorn/swiven.h
Examining data/unzip-6.0/amiga/amiga.c
Examining data/unzip-6.0/amiga/amiga.h
Examining data/unzip-6.0/amiga/filedate.c
Examining data/unzip-6.0/amiga/makesfx.c
Examining data/unzip-6.0/amiga/stat.c
Examining data/unzip-6.0/amiga/z-stat.h
Examining data/unzip-6.0/aosvs/aosvs.c
Examining data/unzip-6.0/aosvs/aosvs.h
Examining data/unzip-6.0/atari/atari.c
Examining data/unzip-6.0/atheos/athcfg.h
Examining data/unzip-6.0/atheos/atheos.c
Examining data/unzip-6.0/atheos/atheos.h
Examining data/unzip-6.0/beos/beos.c
Examining data/unzip-6.0/beos/beos.h
Examining data/unzip-6.0/beos/beocfg.h
Examining data/unzip-6.0/beos/beosmain.cpp
Examining data/unzip-6.0/cmsmvs/vmmvs.c
Examining data/unzip-6.0/cmsmvs/vmmvs.h
Examining data/unzip-6.0/cmsmvs/vmstat.h
Examining data/unzip-6.0/flexos/flexos.c
Examining data/unzip-6.0/flexos/flxcfg.h
Examining data/unzip-6.0/human68k/human68k.c
Examining data/unzip-6.0/macos/UnZp.h
Examining data/unzip-6.0/macos/UnZpLib.h
Examining data/unzip-6.0/macos/UnZpSFX.h
Examining data/unzip-6.0/macos/UnZpSx.h
Examining data/unzip-6.0/macos/source/charmap.h
Examining data/unzip-6.0/macos/source/getenv.c
Examining data/unzip-6.0/macos/source/helpers.c
Examining data/unzip-6.0/macos/source/helpers.h
Examining data/unzip-6.0/macos/source/macbin3.c
Examining data/unzip-6.0/macos/source/macbin3.h
Examining data/unzip-6.0/macos/source/maccfg.h
Examining data/unzip-6.0/macos/source/macdir.c
Examining data/unzip-6.0/macos/source/macdir.h
Examining data/unzip-6.0/macos/source/macos.c
Examining data/unzip-6.0/macos/source/macscreen.c
Examining data/unzip-6.0/macos/source/macstat.c
Examining data/unzip-6.0/macos/source/macstat.h
Examining data/unzip-6.0/macos/source/macstuff.h
Examining data/unzip-6.0/macos/source/mactime.c
Examining data/unzip-6.0/macos/source/mactime.h
Examining data/unzip-6.0/macos/source/macunzip.c
Examining data/unzip-6.0/macos/source/pathname.c
Examining data/unzip-6.0/macos/source/pathname.h
Examining data/unzip-6.0/macos/source/sxunzip.c
Examining data/unzip-6.0/msdos/doscfg.h
Examining data/unzip-6.0/msdos/msdos.c
Examining data/unzip-6.0/netware/nlmcfg.h
Examining data/unzip-6.0/netware/netware.c
Examining data/unzip-6.0/os2/os2.c
Examining data/unzip-6.0/os2/os2acl.c
Examining data/unzip-6.0/os2/os2acl.h
Examining data/unzip-6.0/os2/os2cfg.h
Examining data/unzip-6.0/os2/os2data.h
Examining data/unzip-6.0/os2/rexxapi.c
Examining data/unzip-6.0/os2/rexxhelp.c
Examining data/unzip-6.0/qdos/callstub.c
Examining data/unzip-6.0/qdos/izqdos.h
Examining data/unzip-6.0/qdos/makesfx.c
Examining data/unzip-6.0/qdos/qdos.c
Examining data/unzip-6.0/tandem/tandem.c
Examining data/unzip-6.0/tandem/tandem.h
Examining data/unzip-6.0/tandem/tannsk.h
Examining data/unzip-6.0/tandem/tanunz.c
Examining data/unzip-6.0/theos/charconv.h
Examining data/unzip-6.0/theos/oldstat.h
Examining data/unzip-6.0/theos/stat.h
Examining data/unzip-6.0/theos/theos.c
Examining data/unzip-6.0/theos/thscfg.h
Examining data/unzip-6.0/theos/_fprintf.c
Examining data/unzip-6.0/theos/_isatty.c
Examining data/unzip-6.0/theos/_setargv.c
Examining data/unzip-6.0/theos/_sprintf.c
Examining data/unzip-6.0/theos/_stat.c
Examining data/unzip-6.0/tops20/tops20.c
Examining data/unzip-6.0/unix/unxcfg.h
Examining data/unzip-6.0/unix/unix.c
Examining data/unzip-6.0/vms/bzlib.h
Examining data/unzip-6.0/vms/cmdline.c
Examining data/unzip-6.0/vms/unixio_gcc.h
Examining data/unzip-6.0/vms/unixlib_gcc.h
Examining data/unzip-6.0/vms/vms.c
Examining data/unzip-6.0/vms/vms.h
Examining data/unzip-6.0/vms/vmscfg.h
Examining data/unzip-6.0/vms/vmsdefs.h
Examining data/unzip-6.0/vms/infback9.h
Examining data/unzip-6.0/vms/zlib.h
Examining data/unzip-6.0/win32/crc_i386.c
Examining data/unzip-6.0/win32/nt.c
Examining data/unzip-6.0/win32/nt.h
Examining data/unzip-6.0/win32/rsxntwin.h
Examining data/unzip-6.0/win32/w32cfg.h
Examining data/unzip-6.0/win32/win32.c
Examining data/unzip-6.0/win32/win32i64.c
Examining data/unzip-6.0/wince/intrface.cpp
Examining data/unzip-6.0/wince/intrface.h
Examining data/unzip-6.0/wince/punzip.h
Examining data/unzip-6.0/wince/resource.h
Examining data/unzip-6.0/wince/wcecfg.h
Examining data/unzip-6.0/wince/wcemain.c
Examining data/unzip-6.0/wince/wince.cpp
Examining data/unzip-6.0/wince/wince.h
Examining data/unzip-6.0/wince/winmain.cpp
Examining data/unzip-6.0/wince/winmain.h
Examining data/unzip-6.0/wince/inc/conio.h
Examining data/unzip-6.0/wince/inc/errno.h
Examining data/unzip-6.0/wince/inc/locale.h
Examining data/unzip-6.0/wince/inc/signal.h
Examining data/unzip-6.0/wince/inc/stdio.h
Examining data/unzip-6.0/windll/decs.h
Examining data/unzip-6.0/windll/structs.h
Examining data/unzip-6.0/windll/uzexampl.c
Examining data/unzip-6.0/windll/uzexampl.h
Examining data/unzip-6.0/windll/windll.c
Examining data/unzip-6.0/windll/windll.h
Examining data/unzip-6.0/windll/guisfx/dialog.h
Examining data/unzip-6.0/windll/guisfx/sfxwiz.c
Examining data/unzip-6.0/unzip.c
Examining data/unzip-6.0/crypt.c
Examining data/unzip-6.0/list.c
Examining data/unzip-6.0/zipinfo.c
Examining data/unzip-6.0/fileio.c
Examining data/unzip-6.0/globals.c
Examining data/unzip-6.0/globals.h
Examining data/unzip-6.0/unzip.h
Examining data/unzip-6.0/extract.c
Examining data/unzip-6.0/process.c
Examining data/unzip-6.0/unzpriv.h

FINAL RESULTS:

data/unzip-6.0/acorn/riscos.c:230:5:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
int chmod(char *file, int mode)
data/unzip-6.0/acorn/riscos.h:126:5:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
int chmod(char *file, int mode);
data/unzip-6.0/amiga/amiga.c:749:5:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    chmod(G.filename, G.pInfo->file_attr);
data/unzip-6.0/amiga/stat.c:199:5:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
int chmod(const char *filename, int bits)       /* bits are as for st_mode */
data/unzip-6.0/amiga/z-stat.h:92:5:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
int chmod(const char *filename, int bits);
data/unzip-6.0/aosvs/aosvs.c:1080:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    if (chmod(G.filename, 0xffff & G.pInfo->file_attr))
data/unzip-6.0/atari/atari.c:940:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    if (chmod(G.filename, 0xffff & G.pInfo->file_attr))
data/unzip-6.0/atheos/atheos.c:526:17:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
            if (chmod(G.filename, filtattr(__G__ G.pInfo->file_attr) | 0700))
data/unzip-6.0/atheos/atheos.c:1032:13:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
        if (chown(G.filename, (uid_t)z_uidgid[0], (gid_t)z_uidgid[1]))
data/unzip-6.0/atheos/atheos.c:1065:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    if (chmod(G.filename, filtattr(__G__ G.pInfo->file_attr)))
data/unzip-6.0/atheos/atheos.c:1130:9:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
        chown(UxAtt(d)->fn, (uid_t)UxAtt(d)->uidgid[0],
data/unzip-6.0/atheos/atheos.c:1150:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    if (chmod(d->fn, filtattr(__G__ UxAtt(d)->perms))) {
data/unzip-6.0/beos/beos.c:557:17:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
            if (chmod(G.filename, filtattr(__G__ G.pInfo->file_attr) | 0700))
data/unzip-6.0/beos/beos.c:1076:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    if (chmod(G.filename, filtattr(__G__ G.pInfo->file_attr)))
data/unzip-6.0/beos/beos.c:1086:13:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
        if (chown(G.filename, (uid_t)z_uidgid[0], (gid_t)z_uidgid[1]))
data/unzip-6.0/beos/beos.c:1171:9:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
        chown(UxAtt(d)->fn, (uid_t)UxAtt(d)->uidgid[0],
data/unzip-6.0/beos/beos.c:1191:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    if (chmod(d->fn, filtattr(__G__ UxAtt(d)->perms))) {
data/unzip-6.0/fileio.c:377:17:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
                chmod(G.filename, S_IREAD | S_IWRITE);
data/unzip-6.0/fileio.c:384:13:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
            chmod(G.filename, 0);
data/unzip-6.0/match.c:426:9:  [5] (buffer) gets:
  Does not check for buffer overflows (CWE-120, CWE-20). Use fgets() instead.
        gets(pat);
data/unzip-6.0/match.c:431:13:  [5] (buffer) gets:
  Does not check for buffer overflows (CWE-120, CWE-20). Use fgets() instead.
            gets(str);
data/unzip-6.0/netware/netware.c:454:17:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
            if (chmod(G.filename, (0xffff & G.pInfo->file_attr) | 0700))
data/unzip-6.0/netware/netware.c:796:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    if (chmod(G.filename, 0xffff & G.pInfo->file_attr))
data/unzip-6.0/qdos/qdos.c:985:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    if (chmod(G.filename, 0xffff & G.pInfo->file_attr))
data/unzip-6.0/tandem/tandem.c:306:5:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
int chmod(file, unix_sec)
data/unzip-6.0/tandem/tandem.c:371:5:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
int chown(file, uid, gid)
data/unzip-6.0/tandem/tanunz.c:253:13:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
            chmod(G.filename, S_IRUSR | S_IWUSR);
data/unzip-6.0/tandem/tanunz.c:990:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    if (chmod(G.filename, 0xffff & G.pInfo->file_attr))
data/unzip-6.0/tandem/tanunz.c:1002:13:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
        if (chown(G.filename, (uid_t)z_uidgid[0], (gid_t)z_uidgid[1]))
data/unzip-6.0/theos/stat.h:98:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
#define chmod(a,b)      _chmod(a,b)
data/unzip-6.0/theos/theos.c:461:8:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
#undef chmod
data/unzip-6.0/theos/theos.c:462:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
#define chmod(a,b) (isv2_0() && chmodv2_0(a,b))||(isv2_3() && chmodv2_3(a,b))
data/unzip-6.0/theos/theos.c:466:8:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
#undef chmod
data/unzip-6.0/theos/theos.c:467:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
#define chmod(a,b) chmodv2_0(a,b)
data/unzip-6.0/theos/theos.c:1078:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    if (chmod(G.filename, 0xffff & G.pInfo->file_attr))
data/unzip-6.0/theos/theos.c:1151:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    if (chmod(d->fn, 0xffff & UxAtt(d)->perms)) {
data/unzip-6.0/unix/unix.c:660:17:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
            if (chmod(G.filename, G.pInfo->file_attr | 0700))
data/unzip-6.0/unix/unix.c:1214:13:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
        if (chown(G.filename, (uid_t)z_uidgid[0], (gid_t)z_uidgid[1]))
data/unzip-6.0/unix/unix.c:1265:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    if (chmod(G.filename, filtattr(__G__ G.pInfo->file_attr)))
data/unzip-6.0/unix/unix.c:1356:9:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
        chown(UxAtt(d)->fn, (uid_t)UxAtt(d)->uidgid[0],
data/unzip-6.0/unix/unix.c:1376:9:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    if (chmod(d->fn, UxAtt(d)->perms)) {
data/unzip-6.0/wince/wince.cpp:128:13:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
int __cdecl chmod(const char *filename, int pmode) {
data/unzip-6.0/wince/wince.h:185:21:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
ZCRTIMP int __cdecl chmod(const char *, int);
data/unzip-6.0/acorn/acorn.c:107:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname, dirname);
data/unzip-6.0/acorn/acorn.c:108:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname+dirnamelen, file->d_name);
data/unzip-6.0/acorn/acorn.c:110:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname, file->d_name);
data/unzip-6.0/acorn/acorn.c:142:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(matchname+dirnamelen, file->d_name);
data/unzip-6.0/acorn/acorn.c:144:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(matchname, file->d_name);
data/unzip-6.0/acorn/acorn.c:623:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pathcomp, buildpath);
data/unzip-6.0/acorn/acorn.c:676:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(buildpath, rootpath);
data/unzip-6.0/acorn/acorn.c:710:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tmproot, pathcomp);
data/unzip-6.0/acorn/acorn.c:968:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf((char *)slide, LoadFarString(CompiledWith),
data/unzip-6.0/acorn/riscos.c:108:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
 strcpy(thisdir->dirname,dirname);
data/unzip-6.0/acorn/riscos.c:159:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
 strcpy(dent.d_name,d->act);
data/unzip-6.0/acorn/riscos.c:207:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
 strcpy(s,d);
data/unzip-6.0/acorn/riscos.c:242:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
 sprintf(str,"SetType %s &%3.3X",fname,ftype);
data/unzip-6.0/acorn/riscos.c:257:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
 strcpy(exts2swap, envptr);
data/unzip-6.0/amiga/amiga.c:149:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    strcpy(G.matchname, G.dirname);
data/unzip-6.0/amiga/amiga.c:150:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    strcpy(G.matchname + G.dirnamelen, file->d_name);
data/unzip-6.0/amiga/amiga.c:181:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(G.matchname + G.dirnamelen, file->d_name);
data/unzip-6.0/amiga/amiga.c:567:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pathcomp, G.buildpath);
data/unzip-6.0/amiga/amiga.c:610:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(G.buildpath, G.rootpath);
data/unzip-6.0/amiga/amiga.c:661:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(G.rootpath, pathcomp);
data/unzip-6.0/amiga/amiga.c:1007:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(buf4," on %s",__DATE__);
data/unzip-6.0/amiga/amiga.c:1024:4:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   printf(LoadFarString(CompiledWith),
data/unzip-6.0/amiga/filedate.c:300:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy((ptr+1),fib->fib_FileName);
data/unzip-6.0/aosvs/aosvs.c:174:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname, dirname);
data/unzip-6.0/aosvs/aosvs.c:175:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname+dirnamelen, file->d_name);
data/unzip-6.0/aosvs/aosvs.c:177:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname, file->d_name);
data/unzip-6.0/aosvs/aosvs.c:214:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(matchname+dirnamelen, file->d_name);
data/unzip-6.0/aosvs/aosvs.c:216:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(matchname, file->d_name);
data/unzip-6.0/aosvs/aosvs.c:845:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pathcomp, buildpath);
data/unzip-6.0/aosvs/aosvs.c:898:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(buildpath, rootpath);
data/unzip-6.0/aosvs/aosvs.c:932:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tmproot, pathcomp);
data/unzip-6.0/aosvs/aosvs.c:1043:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(slnk_entry->fname, G.filename);
data/unzip-6.0/aosvs/aosvs.c:1142:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf((char *)slide, LoadFarString(CompiledWith),
data/unzip-6.0/aosvs/aosvs.c:1150:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        (sprintf(cc_versbuf, "(gcc %s)", __VERSION__), cc_versbuf),
data/unzip-6.0/api.c:130:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(version->betalevel, UZ_BETALEVEL);
data/unzip-6.0/api.c:131:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(version->date, UZ_VERSION_DATE);
data/unzip-6.0/api.c:591:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(sz, pattern);
data/unzip-6.0/api.c:594:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(sz, pattern);
data/unzip-6.0/api.c:664:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(G.wildzipfn, archive);
data/unzip-6.0/apihelp.c:101:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(slide, fname);
data/unzip-6.0/atari/atari.c:106:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname, dirname);
data/unzip-6.0/atari/atari.c:107:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname+dirnamelen, file->d_name);
data/unzip-6.0/atari/atari.c:109:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname, file->d_name);
data/unzip-6.0/atari/atari.c:146:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(matchname+dirnamelen, file->d_name);
data/unzip-6.0/atari/atari.c:148:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(matchname, file->d_name);
data/unzip-6.0/atari/atari.c:640:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pathcomp, buildpath);
data/unzip-6.0/atari/atari.c:700:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(buildpath, rootpath);
data/unzip-6.0/atari/atari.c:733:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tmproot, pathcomp);
data/unzip-6.0/atari/atari.c:852:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(slnk_entry->fname, G.filename);
data/unzip-6.0/atari/atari.c:984:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf((char *)slide, LoadFarString(CompiledWith),
data/unzip-6.0/atheos/atheos.c:145:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(G.matchname, G.dirname);
data/unzip-6.0/atheos/atheos.c:146:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(G.matchname+G.dirnamelen, file->d_name);
data/unzip-6.0/atheos/atheos.c:148:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(G.matchname, file->d_name);
data/unzip-6.0/atheos/atheos.c:187:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(G.matchname+G.dirnamelen, file->d_name);
data/unzip-6.0/atheos/atheos.c:189:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(G.matchname, file->d_name);
data/unzip-6.0/atheos/atheos.c:710:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pathcomp, G.buildpath);
data/unzip-6.0/atheos/atheos.c:768:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(G.buildpath, G.rootpath);
data/unzip-6.0/atheos/atheos.c:802:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tmproot, pathcomp);
data/unzip-6.0/atheos/atheos.c:983:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(slnk_entry->fname, G.filename);
data/unzip-6.0/atheos/atheos.c:1113:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(d_entry->fn, G.filename);
data/unzip-6.0/atheos/atheos.c:1197:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf((char *)slide, LoadFarString(CompiledWith),
data/unzip-6.0/beos/beos.c:176:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(G.matchname, G.dirname);
data/unzip-6.0/beos/beos.c:177:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(G.matchname+G.dirnamelen, file->d_name);
data/unzip-6.0/beos/beos.c:179:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(G.matchname, file->d_name);
data/unzip-6.0/beos/beos.c:218:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(G.matchname+G.dirnamelen, file->d_name);
data/unzip-6.0/beos/beos.c:220:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(G.matchname, file->d_name);
data/unzip-6.0/beos/beos.c:746:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pathcomp, G.buildpath);
data/unzip-6.0/beos/beos.c:804:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(G.buildpath, G.rootpath);
data/unzip-6.0/beos/beos.c:838:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tmproot, pathcomp);
data/unzip-6.0/beos/beos.c:1022:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(slnk_entry->fname, G.filename);
data/unzip-6.0/beos/beos.c:1151:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(d_entry->fn, G.filename);
data/unzip-6.0/beos/beos.c:1237:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf((char *)slide, LoadFarString(CompiledWith),
data/unzip-6.0/beos/beos.c:1538:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( buff, "%s/%s", getcwd( cwd_buff, PATH_MAX ), file );
data/unzip-6.0/cmsmvs/vmmvs.c:106:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(basefilename, G.filename);
data/unzip-6.0/cmsmvs/vmmvs.c:208:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(type,  fdata->__openmode == __TEXT   ? ""
data/unzip-6.0/cmsmvs/vmmvs.c:213:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(type,  fdata->__recfmF? "F"
data/unzip-6.0/cmsmvs/vmmvs.c:321:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(newname, lbar+1);
data/unzip-6.0/cmsmvs/vmmvs.c:323:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(G.filename, newname);
data/unzip-6.0/cmsmvs/vmmvs.c:335:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(newname, pmember);
data/unzip-6.0/cmsmvs/vmmvs.c:336:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pmember, lbar);
data/unzip-6.0/cmsmvs/vmmvs.c:338:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(pmember, newname);
data/unzip-6.0/cmsmvs/vmmvs.c:414:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(rootpath, pathcomp);
data/unzip-6.0/cmsmvs/vmmvs.c:430:12:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
           strcat(pathcomp, rootpath);
data/unzip-6.0/cmsmvs/vmmvs.c:436:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
           strcpy(newfilename, rootpath);
data/unzip-6.0/cmsmvs/vmmvs.c:451:18:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                 strcat(newfilename, pathcomp);
data/unzip-6.0/cmsmvs/vmmvs.c:454:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
              strcat(newfilename, start_fname);
data/unzip-6.0/cmsmvs/vmmvs.c:459:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
              strcat(newfilename, pathcomp);
data/unzip-6.0/cmsmvs/vmmvs.c:464:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
           strcpy(pathcomp, newfilename);
data/unzip-6.0/cmsmvs/vmmvs.c:621:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(liblvlmsg, "Using runtime library level %s V%dR%dM%d",
data/unzip-6.0/cmsmvs/vmmvs.c:660:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    len = sprintf((char *)slide, LoadFarString(CompiledWith),
data/unzip-6.0/crypt.c:127:22:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#    define Trace(x) fprintf x
data/unzip-6.0/crypt.c:492:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(GLOBAL(key), passwrd);
data/unzip-6.0/envargs.c:79:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(bufptr, envptr);
data/unzip-6.0/envargs.c:89:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(bufptr, envptr);
data/unzip-6.0/envargs.c:121:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(argstart, argstart + 1);
data/unzip-6.0/fileio.c:286:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access(G.filename, 0) == -1) {
data/unzip-6.0/fileio.c:318:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(tname, G.filename);    /* make backup name */
data/unzip-6.0/fileio.c:326:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(tname, G.filename);    /* make backup name */
data/unzip-6.0/fileio.c:328:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tname+flen, BackupSuffix);
data/unzip-6.0/fileio.c:409:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(tfilnam, G.filename);
data/unzip-6.0/fileio.c:1528:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, prompt, ((Uz_Globs *)pG)->numlines);
data/unzip-6.0/fileio.c:1542:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, LoadFarString(HidePrompt));
data/unzip-6.0/fileio.c:1608:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(prompt, LoadFarString(PasswPrompt),
data/unzip-6.0/fileio.c:2372:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy(G.filename, fn);
data/unzip-6.0/fileio.c:2404:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    strcpy(tmp_fnote+block_len, tmp_fnote+block_len+1);
data/unzip-6.0/fileio.c:2414:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(G.filenotes[G.filenote_slot], tmp_fnote);
data/unzip-6.0/fileio.c:2529:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(fmt, FZOFFT_HEX_WID_VALUE);
data/unzip-6.0/fileio.c:2534:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(fmt, FZOFFT_HEX_WID_VALUE);
data/unzip-6.0/fileio.c:2538:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(fmt, pre);
data/unzip-6.0/fileio.c:2541:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(fmt, FZOFFT_FMT);   /* Long or long-long or whatever. */
data/unzip-6.0/fileio.c:2546:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(fmt, post);     /* Caller's radix. */
data/unzip-6.0/fileio.c:2552:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(G.fzofft_buf[G.fzofft_index], fmt, val);
data/unzip-6.0/flexos/flexos.c:132:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(matchname, dirname);
data/unzip-6.0/flexos/flexos.c:139:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(fnamestart, file->d_name);
data/unzip-6.0/flexos/flexos.c:191:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(fnamestart, file->d_name);
data/unzip-6.0/flexos/flexos.c:610:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pathcomp, buildpath);
data/unzip-6.0/flexos/flexos.c:656:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(buildpath, rootpath);
data/unzip-6.0/flexos/flexos.c:695:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tmproot, pathcomp);
data/unzip-6.0/flexos/flexos.c:912:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    len = sprintf((char *)slide, LoadFarString(CompiledWith),
data/unzip-6.0/gbloffs.c:27:12:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    return printf(asm_flagdef, flagname, flagname);
data/unzip-6.0/gbloffs.c:32:12:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    return printf(ccp_flagdef, flagname, flagname);
data/unzip-6.0/gbloffs.c:61:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(out_format, "h_e", (ulg)&t->e - (ulg)t);
data/unzip-6.0/gbloffs.c:62:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(out_format, "h_b", (ulg)&t->b - (ulg)t);
data/unzip-6.0/gbloffs.c:63:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(out_format, "h_v_n", (ulg)&t->v.n - (ulg)t);
data/unzip-6.0/gbloffs.c:64:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(out_format, "h_v_t", (ulg)&t->v.t - (ulg)t);
data/unzip-6.0/gbloffs.c:65:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(out_format, "SIZEOF_huft", (ulg)sizeof(struct huft));
data/unzip-6.0/gbloffs.c:67:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(out_format, "bb", (ulg)&G.bb - (ulg)&G);
data/unzip-6.0/gbloffs.c:68:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(out_format, "bk", (ulg)&G.bk - (ulg)&G);
data/unzip-6.0/gbloffs.c:69:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(out_format, "wp", (ulg)&G.wp - (ulg)&G);
data/unzip-6.0/gbloffs.c:71:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(out_format, "in", (ulg)&G.in - (ulg)&G);
data/unzip-6.0/gbloffs.c:73:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(out_format, "incnt", (ulg)&G.incnt - (ulg)&G);
data/unzip-6.0/gbloffs.c:74:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(out_format, "inptr", (ulg)&G.inptr - (ulg)&G);
data/unzip-6.0/gbloffs.c:75:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(out_format, "csize", (ulg)&G.csize - (ulg)&G);
data/unzip-6.0/gbloffs.c:76:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(out_format, "mem_mode", (ulg)&G.mem_mode - (ulg)&G);
data/unzip-6.0/gbloffs.c:78:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(out_format, "redirslide", (ulg)&redirSlide - (ulg)&G);
data/unzip-6.0/gbloffs.c:79:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(out_format, "SIZEOF_slide", (ulg)sizeof(redirSlide));
data/unzip-6.0/gbloffs.c:81:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(out_format, "_wsize", (ulg)&G._wsize - (ulg)&G);
data/unzip-6.0/gbloffs.c:83:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(out_format, "CRYPT", (ulg)CRYPT);
data/unzip-6.0/globals.c:147:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        fprintf(stderr, noEntry);  /* can't use Info w/o a global pointer */
data/unzip-6.0/human68k/human68k.c:93:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(matchname, wildspec);
data/unzip-6.0/human68k/human68k.c:113:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname, dirname);
data/unzip-6.0/human68k/human68k.c:114:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname+dirnamelen, file->d_name);
data/unzip-6.0/human68k/human68k.c:116:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname, file->d_name);
data/unzip-6.0/human68k/human68k.c:159:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(matchname+dirnamelen, file->d_name);
data/unzip-6.0/human68k/human68k.c:161:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(matchname, file->d_name);
data/unzip-6.0/human68k/human68k.c:496:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(np, last_dot);
data/unzip-6.0/human68k/human68k.c:625:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pathcomp, buildpath);
data/unzip-6.0/human68k/human68k.c:670:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(buildpath, rootpath);
data/unzip-6.0/human68k/human68k.c:705:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tmproot, pathcomp);
data/unzip-6.0/human68k/human68k.c:933:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    len = sprintf((char *)slide, LoadFarString(CompiledWith),
data/unzip-6.0/human68k/human68k.c:972:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    argv[0] = strcat (strcpy (argv0, _procp->exe_path), _procp->exe_name);
data/unzip-6.0/human68k/human68k.c:972:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    argv[0] = strcat (strcpy (argv0, _procp->exe_path), _procp->exe_name);
data/unzip-6.0/inflate.c:308:34:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define MESSAGE(str,len,flag)  fprintf(stderr,(char *)(str))
data/unzip-6.0/inflate.c:323:22:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#    define Trace(x) fprintf x
data/unzip-6.0/list.c:392:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(cfactorstr, LoadFarString(CompFactor100));
data/unzip-6.0/list.c:394:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(cfactorstr, LoadFarString(CompFactorStr), sgn, cfactor);
data/unzip-6.0/list.c:474:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(cfactorstr, LoadFarString(CompFactor100));
data/unzip-6.0/list.c:476:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(cfactorstr, LoadFarString(CompFactorStr), sgn, cfactor);
data/unzip-6.0/macos/source/maccfg.h:108:15:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#      define fprintf     macfprintf
data/unzip-6.0/macos/source/maccfg.h:110:15:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#      define printf      macprintf
data/unzip-6.0/macos/source/macdir.c:164:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dirPtr->d_name, name);
data/unzip-6.0/macos/source/macos.c:247:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname, dirname);
data/unzip-6.0/macos/source/macos.c:248:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname+dirnamelen, file->d_name);
data/unzip-6.0/macos/source/macos.c:250:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname, file->d_name);
data/unzip-6.0/macos/source/macos.c:282:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(matchname+dirnamelen, file->d_name);
data/unzip-6.0/macos/source/macos.c:284:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(matchname, file->d_name);
data/unzip-6.0/macos/source/macos.c:640:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pathcomp, buildpath);
data/unzip-6.0/macos/source/macos.c:690:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(buildpath, rootpath);
data/unzip-6.0/macos/source/macos.c:727:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tmproot, pathcomp);
data/unzip-6.0/macos/source/macos.c:947:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(DateTime,"%s  %s",__DATE__, __TIME__);
data/unzip-6.0/macos/source/macos.c:949:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf((char *)slide, LoadFarString(CompiledWith),
data/unzip-6.0/macos/source/macos.c:1011:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(CompletePath, uO.exdir);
data/unzip-6.0/macos/source/macos.c:1012:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(CompletePath, newExtraField.FullPath);
data/unzip-6.0/macos/source/macos.c:1017:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(CompletePath, path);
data/unzip-6.0/macos/source/macos.c:1154:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy((char *)CurrentFile.name,
data/unzip-6.0/macos/source/macos.c:1283:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(ArchiveDir, &G.filename[exdirlen+1]);
data/unzip-6.0/macos/source/macos.c:1287:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(G.filename, ArchiveDir);
data/unzip-6.0/macos/source/macos.c:1292:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(G.filename,newExtraField.FullPath);
data/unzip-6.0/macos/source/macscreen.c:400:10:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    rc = vsprintf(buffer, format, ap);
data/unzip-6.0/macos/source/macscreen.c:418:10:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    rc = vsprintf(buffer, format, ap);
data/unzip-6.0/macos/source/macunzip.c:595:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(UnzipVersion, "%d.%d%d%s of %s", UZ_MAJORVER, UZ_MINORVER,
data/unzip-6.0/macos/source/macunzip.c:597:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(ZipinfoVersion, "%d.%d%d%s of %s", ZI_MAJORVER, ZI_MINORVER,
data/unzip-6.0/macos/source/macunzip.c:768:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(ExtractPath,ArchivePath);
data/unzip-6.0/macos/source/pathname.c:158:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer,"%s%d",ExtractPath,count);
data/unzip-6.0/macos/source/pathname.c:365:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    return strcpy(FileName, FilePath); /* FilePath has no Folders */
data/unzip-6.0/macos/source/pathname.c:368:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
return strcpy(FileName, dirPtr);
data/unzip-6.0/macos/source/pathname.c:689:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    return strcpy(filename,LongFilename);
data/unzip-6.0/macos/source/pathname.c:693:1:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
strcpy(tempLongFilename,LongFilename);
data/unzip-6.0/macos/source/pathname.c:717:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename,"%s%s", tempLongFilename, charnum);
data/unzip-6.0/macos/source/pathname.c:722:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename,"%s%s%s", tempLongFilename, charnum, last_dotpos);
data/unzip-6.0/macos/source/sxunzip.c:126:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf(UnZipVersionLocal, "[%s %s]", __DATE__, __TIME__);
data/unzip-6.0/macos/source/sxunzip.c:140:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf(UnzipVersion, "Unzip Module\n%d.%d%d%s of %s", UZ_MAJORVER,
data/unzip-6.0/match.c:145:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(dospattern, pattern);
data/unzip-6.0/msdos/doscfg.h:277:58:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#   define ISO_TO_INTERN(src, dst)  {if ((src) != (dst)) strcpy((dst), (src));}
data/unzip-6.0/msdos/doscfg.h:279:58:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#   define INTERN_TO_ISO(src, dst)  {if ((src) != (dst)) strcpy((dst), (src));}
data/unzip-6.0/msdos/doscfg.h:284:58:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#   define OEM_TO_INTERN(src, dst)  {if ((src) != (dst)) strcpy((dst), (src));}
data/unzip-6.0/msdos/doscfg.h:286:58:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#   define INTERN_TO_OEM(src, dst)  {if ((src) != (dst)) strcpy((dst), (src));}
data/unzip-6.0/msdos/msdos.c:223:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(nbuf, name);
data/unzip-6.0/msdos/msdos.c:329:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(matchname, dirname);
data/unzip-6.0/msdos/msdos.c:336:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(fnamestart, file->d_name);
data/unzip-6.0/msdos/msdos.c:389:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(fnamestart, file->d_name);
data/unzip-6.0/msdos/msdos.c:969:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pathcomp, buildpath);
data/unzip-6.0/msdos/msdos.c:1042:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(buildpath, rootpath);
data/unzip-6.0/msdos/msdos.c:1081:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tmproot, pathcomp);
data/unzip-6.0/msdos/msdos.c:1839:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(msg_str, app);
data/unzip-6.0/msdos/msdos.c:1856:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    len = sprintf((char *)slide, LoadFarString(CompiledWith),
data/unzip-6.0/msdos/msdos.c:2142:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(i_name, name);
data/unzip-6.0/msdos/msdos.c:2422:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(newname, path);
data/unzip-6.0/netware/netware.c:145:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname, dirname);
data/unzip-6.0/netware/netware.c:146:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname+dirnamelen, file->d_name);
data/unzip-6.0/netware/netware.c:148:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname, file->d_name);
data/unzip-6.0/netware/netware.c:185:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(matchname+dirnamelen, file->d_name);
data/unzip-6.0/netware/netware.c:187:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(matchname, file->d_name);
data/unzip-6.0/netware/netware.c:619:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pathcomp, buildpath);
data/unzip-6.0/netware/netware.c:677:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(buildpath, rootpath);
data/unzip-6.0/netware/netware.c:730:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(rootpath, pathcomp);
data/unzip-6.0/netware/netware.c:834:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    len = sprintf((char *)slide, LoadFarString(CompiledWith),
data/unzip-6.0/os2/os2.c:473:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(szName, G.filename);
data/unzip-6.0/os2/os2.c:570:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(szName, path);
data/unzip-6.0/os2/os2.c:696:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(nbuf, name);
data/unzip-6.0/os2/os2.c:766:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dp -> _d_entry, s);
data/unzip-6.0/os2/os2.c:798:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strlen(strcpy(G.os2.dp.d_name, dirp -> dd_cp -> _d_entry));
data/unzip-6.0/os2/os2.c:996:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(G.os2.matchname, G.os2.dirname);
data/unzip-6.0/os2/os2.c:1003:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(fnamestart, file->d_name);
data/unzip-6.0/os2/os2.c:1056:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(fnamestart, file->d_name);
data/unzip-6.0/os2/os2.c:1413:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(FSInfoBuf.szVolLabel, G.filename);
data/unzip-6.0/os2/os2.c:1579:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pathcomp, G.os2.buildpathFAT);
data/unzip-6.0/os2/os2.c:1639:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(G.os2.lastpathcomp, pathcomp);
data/unzip-6.0/os2/os2.c:1706:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(G.os2.buildpathHPFS, pathcomp);
data/unzip-6.0/os2/os2.c:1708:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(G.os2.buildpathHPFS, G.os2.rootpath);
data/unzip-6.0/os2/os2.c:1750:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tmproot, pathcomp);
data/unzip-6.0/os2/os2.c:2027:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy((char *) fealst.szValue, longname);
data/unzip-6.0/os2/os2.c:2174:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    len = sprintf((char *)slide, LoadFarString(CompiledWith),
data/unzip-6.0/os2/os2acl.c:270:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(buffer, cwd);
data/unzip-6.0/os2/os2acl.c:276:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(buffer, source);
data/unzip-6.0/os2/os2acl.c:301:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    offs += sprintf(text + offs, "%s,%X\n",
data/unzip-6.0/os2/rexxapi.c:109:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy((t)->strptr,(s));\
data/unzip-6.0/os2/rexxapi.c:198:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(trav[count-1],G.os2.buffer);
data/unzip-6.0/os2/rexxapi.c:593:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( retstr->strptr, "%d.%d%d%s", UZ_MAJORVER, UZ_MINORVER,
data/unzip-6.0/os2/rexxapi.c:597:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf( retstr->strptr, "%d.%d%d%s of %s", UZ_MAJORVER, UZ_MINORVER,
data/unzip-6.0/os2/rexxapi.c:685:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(G.os2.output_var, name);
data/unzip-6.0/os2/rexxapi.c:704:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(G.os2.output_var, name);
data/unzip-6.0/os2/rexxapi.c:759:13:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
  int ret = vsprintf(G.os2.buffer, format, arg_ptr);
data/unzip-6.0/os2/rexxapi.c:838:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(G.os2.output_var+G.os2.stem_len, G.filename);
data/unzip-6.0/os2/rexxapi.c:852:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(scan,G.filename);
data/unzip-6.0/os2/rexxapi.c:859:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(G.os2.getvar_buf, G.os2.output_var);
data/unzip-6.0/process.c:352:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(G.zipfn, G.argv0);
data/unzip-6.0/process.c:353:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(G.zipfn+len, EXE_EXTENSION);
data/unzip-6.0/process.c:378:13:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
            system(G.autorun_command);
data/unzip-6.0/process.c:457:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
              strcpy(lastzipfn + strlen(lastzipfn), ZSUFX);
data/unzip-6.0/process.c:473:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(p, ALT_ZSUFX);
data/unzip-6.0/process.c:2436:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(e, d);
data/unzip-6.0/process.c:2441:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(r, e);
data/unzip-6.0/process.c:2545:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(buffer, escape_string);
data/unzip-6.0/process.c:2555:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(buffer, escape_string);
data/unzip-6.0/process.c:2560:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(local_string, buffer);
data/unzip-6.0/process.c:2583:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(display_string, local_string);
data/unzip-6.0/qdos/makesfx.c:153:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            if(access(xf, ZMODE))
data/unzip-6.0/qdos/qdos.c:140:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(f,o);
data/unzip-6.0/qdos/qdos.c:290:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname, dirname);
data/unzip-6.0/qdos/qdos.c:291:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname+dirnamelen, file->d_name);
data/unzip-6.0/qdos/qdos.c:293:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname, file->d_name);
data/unzip-6.0/qdos/qdos.c:325:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(matchname+dirnamelen, file->d_name);
data/unzip-6.0/qdos/qdos.c:327:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(matchname, file->d_name);
data/unzip-6.0/qdos/qdos.c:734:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pathcomp, buildpath);
data/unzip-6.0/qdos/qdos.c:797:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(buildpath, rootpath);
data/unzip-6.0/qdos/qdos.c:831:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tmproot, pathcomp);
data/unzip-6.0/qdos/qdos.c:1076:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf((char *)slide, LoadFarString(CompiledWith),
data/unzip-6.0/tandem/tandem.c:77:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(x, TANDEM_NODE_STR);
data/unzip-6.0/tandem/tandem.c:81:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(x, TANDEM_DELIMITER_STR);
data/unzip-6.0/tandem/tandem.c:136:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(x, TANDEM_EXTENSION_STR);
data/unzip-6.0/tandem/tandem.c:251:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  short len, fnum, access, exclus, options;
data/unzip-6.0/tandem/tandem.c:293:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    err = FILE_OPEN_((char *)fname, len, &fnum, access, exclus,,,options,,,);
data/unzip-6.0/tandem/tandem.c:326:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  short len, access, exclus, extension, options;
data/unzip-6.0/tandem/tandem.c:362:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  err = FILE_OPEN_((char *)fname, len, &fnum, access, exclus,,,options,,,);
data/unzip-6.0/tandem/tandem.c:387:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  short len, access, exclus, extension, options;
data/unzip-6.0/tandem/tandem.c:403:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  err = FILE_OPEN_((char *)fname, len, &fnum, access, exclus,,,options,,,);
data/unzip-6.0/tandem/tandem.c:821:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(dirp->D_path, dirname);
data/unzip-6.0/tandem/tandem.c:846:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
       strcat(dirp->D_curpos->d_name,TANDEM_EXTENSION_STR);
data/unzip-6.0/tandem/tandem.c:847:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
       strcat(dirp->D_curpos->d_name,ext);
data/unzip-6.0/tandem/tanunz.c:100:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(dirname, wildspec);
data/unzip-6.0/tandem/tanunz.c:115:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname, dirname);
data/unzip-6.0/tandem/tanunz.c:116:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname+dirnamelen, file->d_name);
data/unzip-6.0/tandem/tanunz.c:118:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname, file->d_name);
data/unzip-6.0/tandem/tanunz.c:154:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(matchname+dirnamelen, file->d_name);
data/unzip-6.0/tandem/tanunz.c:156:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(matchname, file->d_name);
data/unzip-6.0/tandem/tanunz.c:523:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(G.filename, pp);
data/unzip-6.0/tandem/tanunz.c:694:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pathcomp, buildpath);
data/unzip-6.0/tandem/tanunz.c:764:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(buildpath, rootpath);
data/unzip-6.0/tandem/tanunz.c:798:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tmproot, pathcomp);
data/unzip-6.0/tandem/tanunz.c:1029:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf((char *)slide, LoadFarString(CompiledWith),
data/unzip-6.0/theos/_fprintf.c:22:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    n = vfprintf(fp, fmt, (long*) ap);
data/unzip-6.0/theos/_setargv.c:77:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(lib, path);
data/unzip-6.0/theos/_setargv.c:91:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(lib, disk);
data/unzip-6.0/theos/_setargv.c:126:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(lib, libname(arg));
data/unzip-6.0/theos/_sprintf.c:22:9:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    n = vsprintf(s, fmt, (long*) ap);
data/unzip-6.0/theos/_stat.c:178:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf2, ifn);
data/unzip-6.0/theos/theos.c:180:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(matchname, wildspec);
data/unzip-6.0/theos/theos.c:216:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname, dirname);
data/unzip-6.0/theos/theos.c:217:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname+dirnamelen, file->d_name);
data/unzip-6.0/theos/theos.c:219:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(matchname, file->d_name);
data/unzip-6.0/theos/theos.c:256:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(matchname+dirnamelen, file->d_name);
data/unzip-6.0/theos/theos.c:258:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(matchname, file->d_name);
data/unzip-6.0/theos/theos.c:718:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(buildpath, rootdisk);
data/unzip-6.0/theos/theos.c:801:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pathcomp, buildpath);
data/unzip-6.0/theos/theos.c:835:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(buildpath, rootdisk);
data/unzip-6.0/theos/theos.c:860:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(buildpath, rootpath);
data/unzip-6.0/theos/theos.c:901:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(tmproot, pathcomp);
data/unzip-6.0/theos/theos.c:1130:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(d_entry->fn, G.filename);
data/unzip-6.0/theos/theos.c:1200:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(slide, CompiledWith,
data/unzip-6.0/theos/thscfg.h:45:9:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# undef fprintf
data/unzip-6.0/theos/thscfg.h:46:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
# undef sprintf
data/unzip-6.0/theos/thscfg.h:47:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
# define fprintf _fprintf
data/unzip-6.0/theos/thscfg.h:48:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
# define sprintf _sprintf
data/unzip-6.0/theos/thscfg.h:53:6:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
     fprintf((flag)&1? stderr : stdout, (char *)(_sprintf sprf_arg, (buf)))
data/unzip-6.0/timezone.c:501:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(old_TZstring, TZstring);
data/unzip-6.0/tops20/tops20.c:198:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf((char *)slide, LoadFarString(CompiledWith),
data/unzip-6.0/tops20/tops20.c:275:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(s, d);
data/unzip-6.0/tops20/tops20.c:302:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(s, d);
data/unzip-6.0/unix/unix.c:249:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(G.matchname, G.dirname);
data/unzip-6.0/unix/unix.c:250:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(G.matchname+G.dirnamelen, file->d_name);
data/unzip-6.0/unix/unix.c:252:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy(G.matchname, file->d_name);
data/unzip-6.0/unix/unix.c:291:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(G.matchname+G.dirnamelen, file->d_name);
data/unzip-6.0/unix/unix.c:293:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(G.matchname, file->d_name);
data/unzip-6.0/unix/unix.c:859:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pathcomp, G.buildpath);
data/unzip-6.0/unix/unix.c:917:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(G.buildpath, G.rootpath);
data/unzip-6.0/unix/unix.c:951:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tmproot, pathcomp);
data/unzip-6.0/unix/unix.c:1030:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(command, "IFS=\" \t\n\" /bin/mkdir '%s' 2>/dev/null", path);
data/unzip-6.0/unix/unix.c:1031:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    if (system(command))
data/unzip-6.0/unix/unix.c:1166:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(slnk_entry->fname, G.filename);
data/unzip-6.0/unix/unix.c:1336:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(d_entry->fn, G.filename);
data/unzip-6.0/unix/unix.c:1453:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf((char *)slide, LoadFarString(CompiledWith),
data/unzip-6.0/unix/unix.c:1461:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        (sprintf(cc_versbuf, "(gcc %s)", __VERSION__), cc_versbuf),
data/unzip-6.0/unzip.c:2496:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf((char *)(slide+256), LoadFarStringSmall(Use_Unicode),
data/unzip-6.0/unzip.c:2507:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf((char *)(slide+256), LoadFarStringSmall(Have_MBCS_Support),
data/unzip-6.0/unzip.c:2546:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf((char *)(slide+256), LoadFarStringSmall(UseZlib),
data/unzip-6.0/unzip.c:2553:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf((char *)(slide+256), LoadFarStringSmall(UseBZip2),
data/unzip-6.0/unzpriv.h:1000:37:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#  define zfstrcpy(dest, src)       strcpy((dest), (src))
data/unzip-6.0/unzpriv.h:2668:24:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#    define Trace(x)   fprintf x
data/unzip-6.0/unzpriv.h:2675:22:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#  define TTrace(x)  fprintf x
data/unzip-6.0/unzpriv.h:2714:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
     fputs((char *)(sprintf sprf_arg, (buf)), (flag)&1? stderr : stdout)
data/unzip-6.0/unzpriv.h:2718:53:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
       (*G.message)((zvoid *)&G, (uch *)(buf), (ulg)sprintf sprf_arg, (flag))
data/unzip-6.0/unzpriv.h:2722:28:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                     (ulg)(sprintf sprf_arg, strlen((char *)(buf))), (flag))
data/unzip-6.0/unzpriv.h:2934:33:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#    define STR_TO_ISO          strcpy
data/unzip-6.0/unzpriv.h:2943:33:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#    define STR_TO_OEM          strcpy
data/unzip-6.0/vms/cmdline.c:745:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(&the_cmd_line[x], options);
data/unzip-6.0/vms/vms.c:661:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(timbuf, "%02u-%3s-%04u %02u:%02u:%02u.00",
data/unzip-6.0/vms/vms.c:858:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(buf, "[ Cannot create ($create) output file %s ]\n",
data/unzip-6.0/vms/vms.c:1025:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(buf, "[ Cannot create ($create) output file %s ]\n",
data/unzip-6.0/vms/vms.c:1043:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(buf, "[ Cannot allocate space for %s ]\n", G.filename);
data/unzip-6.0/vms/vms.c:1422:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(buf, "[ Cannot create (QIO) output file %s ]\n",
data/unzip-6.0/vms/vms.c:1512:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy((semi_col_orig + 1), (semi_col_res + 1));
data/unzip-6.0/vms/vms.c:2770:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    strcpy(slnk_entry->fname, G.filename);
data/unzip-6.0/vms/vms.c:3021:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(dir_file, "%.*s000000%c%.*s%s",
data/unzip-6.0/vms/vms.c:3030:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(dir_file, "%.*s%c%.*s%s",
data/unzip-6.0/vms/vms.c:3079:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(d_entry->fn, G.filename);
data/unzip-6.0/vms/vms.c:3282:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(warnmsg,
data/unzip-6.0/vms/vms.c:3297:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(warnmsg,
data/unzip-6.0/vms/vms.c:3380:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(warnmsg,
data/unzip-6.0/vms/vms.c:3429:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(warnmsg,
data/unzip-6.0/vms/vms.c:3564:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(timbuf, "%02d-%3s-%04d %02d:%02d:%02d.00",
data/unzip-6.0/vms/vms.c:3591:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        unsigned system : 4;
data/unzip-6.0/vms/vms.c:3904:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy( last_wild, wld );
data/unzip-6.0/vms/vms.c:4518:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(G.filename, pathcomp);
data/unzip-6.0/vms/vms.c:4797:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pathbuf, nam.NAM_ESA);
data/unzip-6.0/vms/vms.c:4895:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(end, pathcomp);
data/unzip-6.0/vms/vms.c:4975:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    strcpy(lastdir, pathbuf);
data/unzip-6.0/vms/vms.c:4985:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                    strcpy(lastdir, PATH_DEFAULT);
data/unzip-6.0/vms/vms.c:4993:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(end, pathcomp);
data/unzip-6.0/vms/vms.c:5008:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy( pathcomp, pathbuf );
data/unzip-6.0/vms/vms.c:5472:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    len = sprintf((char *)slide, LoadFarString(CompiledWith),
data/unzip-6.0/vms/vms.c:5500:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      (sprintf(buf, " (%s Alpha)", vms_vers), buf),
data/unzip-6.0/vms/vms.c:5503:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      (sprintf(buf, " (%s IA64)", vms_vers), buf),
data/unzip-6.0/vms/vms.c:5506:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      (sprintf(buf, " (%s VAX)", vms_vers), buf),
data/unzip-6.0/win32/nt.c:390:13:  [4] (buffer) lstrcpynA:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            lstrcpynA(g_VolumeCaps.RootPath, TempRootPath, cchTempRootPath+1);
data/unzip-6.0/win32/w32cfg.h:270:57:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#  define ISO_TO_INTERN(src, dst)  {if ((src) != (dst)) strcpy((dst), (src));}
data/unzip-6.0/win32/w32cfg.h:272:57:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#  define INTERN_TO_ISO(src, dst)  {if ((src) != (dst)) strcpy((dst), (src));}
data/unzip-6.0/win32/w32cfg.h:278:57:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#  define OEM_TO_INTERN(src, dst)  {if ((src) != (dst)) strcpy((dst), (src));}
data/unzip-6.0/win32/w32cfg.h:280:57:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#  define INTERN_TO_OEM(src, dst)  {if ((src) != (dst)) strcpy((dst), (src));}
data/unzip-6.0/win32/win32.c:250:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(d->d_name, fd.cFileName);
data/unzip-6.0/win32/win32.c:1215:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(d_entry->fn, G.filename);
data/unzip-6.0/win32/win32.c:1542:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(G.matchname, G.dirname);
data/unzip-6.0/win32/win32.c:1549:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(fnamestart, file->d_name);
data/unzip-6.0/win32/win32.c:1597:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(fnamestart, file->d_name);
data/unzip-6.0/win32/win32.c:2155:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(G.buildpathFAT, 0) != 0) {
data/unzip-6.0/win32/win32.c:2257:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pathcomp, G.buildpathFAT);
data/unzip-6.0/win32/win32.c:2375:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(G.buildpathHPFS, pathcomp);
data/unzip-6.0/win32/win32.c:2377:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(G.buildpathHPFS, G.rootpath);
data/unzip-6.0/win32/win32.c:2419:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tmproot, pathcomp);
data/unzip-6.0/win32/win32.c:2547:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    len = sprintf((char *)slide, CompiledWith,
data/unzip-6.0/win32/win32.c:3007:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(buffer, escape_string);
data/unzip-6.0/win32/win32.c:3017:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(buffer, escape_string);
data/unzip-6.0/wince/intrface.cpp:266:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(g_szZipFile, pG->zipfn);
data/unzip-6.0/wince/intrface.cpp:423:7:  [4] (buffer) _tcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
      _tcscat(szDirectory, TEXT("\\"));
data/unzip-6.0/wince/intrface.cpp:478:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(pG->zipfn, szZipFile);
data/unzip-6.0/wince/intrface.cpp:488:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(pG->wildzipfn, szZipFile);
data/unzip-6.0/wince/intrface.cpp:934:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(g_pFileLast->szPathAndMethod, szPath);
data/unzip-6.0/wince/intrface.cpp:935:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(g_pFileLast->szPathAndMethod + strlen(szPath) + 1, szMethod);
data/unzip-6.0/wince/intrface.cpp:1414:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      return strcpy(G.matchname, wildspec);
data/unzip-6.0/wince/intrface.cpp:1419:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         return strcpy(G.matchname, wildspec);
data/unzip-6.0/wince/intrface.cpp:1524:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(szBuffer, g_szExtractToDirectory);
data/unzip-6.0/wince/intrface.cpp:1526:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(szBuffer, G.rootpath);
data/unzip-6.0/wince/intrface.cpp:1641:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(G.filename, szBuffer);
data/unzip-6.0/wince/intrface.cpp:1646:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(g_pExtractInfo->szMappedPath, szBuffer);
data/unzip-6.0/wince/intrface.cpp:1852:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(buffer, escape_string);
data/unzip-6.0/wince/intrface.cpp:1862:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(buffer, escape_string);
data/unzip-6.0/wince/wcecfg.h:137:55:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define OEM_TO_INTERN(src, dst)  {if ((src) != (dst)) strcpy((dst), (src));}
data/unzip-6.0/wince/wcecfg.h:138:55:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define INTERN_TO_ISO(src, dst)  {if ((src) != (dst)) strcpy((dst), (src));}
data/unzip-6.0/wince/wince.cpp:88:4:  [4] (format) _vsntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   _vsntprintf(szBuffer + 8, countof(szBuffer) - 10, szFormat, pArgs);
data/unzip-6.0/wince/wince.cpp:100:4:  [4] (buffer) _tcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
   _tcscat(szBuffer, TEXT("\r\n"));
data/unzip-6.0/wince/wince.cpp:308:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
int __cdecl fprintf(FILE *stream, const char *format, ...) {
data/unzip-6.0/wince/wince.cpp:339:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
int __cdecl sprintf(char *buffer, const char *format, ...) {
data/unzip-6.0/wince/wince.cpp:362:4:  [4] (format) _vsntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   _vsntprintf(wszBuffer, countof(wszBuffer), wszFormat, pArgs);
data/unzip-6.0/wince/wince.h:102:9:  [4] (buffer) _stprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#ifndef _stprintf
data/unzip-6.0/wince/wince.h:103:9:  [4] (buffer) _stprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define _stprintf wsprintf
data/unzip-6.0/wince/wince.h:107:9:  [4] (format) _vsntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#ifndef _vsntprintf
data/unzip-6.0/wince/wince.h:108:9:  [4] (format) _vsntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define _vsntprintf(d,c,f,a) wvsprintf(d,f,a)
data/unzip-6.0/wince/wince.h:217:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
ZCRTIMP int __cdecl fprintf(FILE *, const char *, ...);
data/unzip-6.0/wince/wince.h:220:21:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
ZCRTIMP int __cdecl sprintf(char *, const char *, ...);
data/unzip-6.0/wince/winmain.cpp:319:7:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
      _tcscpy(lf.lfFaceName, TEXT("MS Sans Serif"));
data/unzip-6.0/wince/winmain.cpp:494:7:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
      lstrcpy(g_szTempDirPath + 3, TEXT("Temporary Pocket UnZip Files"));
data/unzip-6.0/wince/winmain.cpp:522:7:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
      _tcscpy(szPath, g_szTempDir);
data/unzip-6.0/wince/winmain.cpp:584:7:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
      _tcscpy(szEnd, TEXT(" %1"));
data/unzip-6.0/wince/winmain.cpp:588:7:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
      _stprintf(szEnd, TEXT(",-%u"), IDI_ZIPFILE);
data/unzip-6.0/wince/winmain.cpp:650:7:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
      _tcscpy(szEnd, TEXT("\\DefaultIcon"));
data/unzip-6.0/wince/winmain.cpp:675:10:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
         _tcscpy(szEnd, TEXT("\\shell\\Open\\command"));
data/unzip-6.0/wince/winmain.cpp:1123:7:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
      _stprintf(szPath,
data/unzip-6.0/wince/winmain.cpp:1182:10:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
         _tcscpy(szPath, GetZipErrorString(ei.result));
data/unzip-6.0/wince/winmain.cpp:1186:10:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         _stprintf(szPath,
data/unzip-6.0/wince/winmain.cpp:1331:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(szBuffer, pFile->szPathAndMethod);
data/unzip-6.0/wince/winmain.cpp:1352:10:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         _stprintf(plvdi->item.pszText, TEXT("%u/%u/%u %u:%02u %cM"),
data/unzip-6.0/wince/winmain.cpp:1371:10:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         _stprintf(plvdi->item.pszText, TEXT("%d.%d%%"), factor / 10,
data/unzip-6.0/wince/winmain.cpp:1381:10:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         _stprintf(plvdi->item.pszText, TEXT("%08X"), pFile->dwCRC);
data/unzip-6.0/wince/winmain.cpp:1430:10:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         _stprintf(szColumn, (g_columns[g_sortColumn].format == LVCFMT_LEFT) ?
data/unzip-6.0/wince/winmain.cpp:1439:7:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
      _stprintf(szColumn, (g_columns[g_sortColumn].format == LVCFMT_LEFT) ?
data/unzip-6.0/wince/winmain.cpp:1545:7:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
      _stprintf(szCaption, TEXT("%s - "), szPrefix);
data/unzip-6.0/wince/winmain.cpp:1554:7:  [4] (buffer) _tcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
      _tcscat(szCaption, TEXT("Pocket UnZip"));
data/unzip-6.0/wince/winmain.cpp:1607:7:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
      _tcscpy(szPath, TEXT("Initializing..."));
data/unzip-6.0/wince/winmain.cpp:1611:10:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         _stprintf(szPath, TEXT("Loading %S"), g_szZipFile);
data/unzip-6.0/wince/winmain.cpp:1613:10:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         _stprintf(szPath, TEXT("Loading %s"), g_szZipFile);
data/unzip-6.0/wince/winmain.cpp:1619:7:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
      _tcscpy(szPath, TEXT("No File Loaded"));
data/unzip-6.0/wince/winmain.cpp:1654:10:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         _stprintf(szColumn, (g_columns[column].format == LVCFMT_LEFT) ?
data/unzip-6.0/wince/winmain.cpp:1942:16:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
      case 2:  _stprintf(szValue, TEXT("%u,%03u"), dwGroup[1], dwGroup[0]); break;
data/unzip-6.0/wince/winmain.cpp:1943:16:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
      case 3:  _stprintf(szValue, TEXT("%u,%03u,%03u"), dwGroup[2], dwGroup[1], dwGroup[0]); break;
data/unzip-6.0/wince/winmain.cpp:1944:16:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
      case 4:  _stprintf(szValue, TEXT("%u,%03u,%03u,%03u"), dwGroup[3], dwGroup[2], dwGroup[1], dwGroup[0]); break;
data/unzip-6.0/wince/winmain.cpp:1947:11:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
          _stprintf(szValue, TEXT("%u,%03u,%03u,%03u,%03u"),
data/unzip-6.0/wince/winmain.cpp:1951:11:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
          _stprintf(szValue, TEXT("%u,%03u,%03u,%03u,%03u,%03u"), dwGroup[5],
data/unzip-6.0/wince/winmain.cpp:1955:11:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
          _stprintf(szValue, TEXT("%u,%03u,%03u,%03u,%03u,%03u,%03u"), dwGroup[6], dwGroup[5],
data/unzip-6.0/wince/winmain.cpp:1959:11:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
          _stprintf(szValue, TEXT("%u,%03u,%03u,%03u,%03u,%03u,%03u,%03u"), dwGroup[7], dwGroup[6], dwGroup[5],
data/unzip-6.0/wince/winmain.cpp:1962:16:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
      default: _stprintf(szValue, TEXT("%u"), dwGroup[0]);
data/unzip-6.0/wince/winmain.cpp:1970:4:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
   _stprintf(szBuffer, TEXT("%s%s%s%s%s%s%s%s"),
data/unzip-6.0/wince/winmain.cpp:1998:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(szType, pszExt + 1);
data/unzip-6.0/wince/winmain.cpp:2046:4:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
   _tcscpy(szEnd, TEXT("\\*.*"));
data/unzip-6.0/wince/winmain.cpp:2057:10:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
         _tcscpy(szEnd + 1, w32fd.cFileName);
data/unzip-6.0/wince/winmain.cpp:2161:7:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
      _tcscpy(szValue, szDefault);
data/unzip-6.0/wince/winmain.cpp:2286:7:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
      _stprintf(szOption, TEXT("MRU%d"), i+1);
data/unzip-6.0/wince/winmain.cpp:2327:7:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
      _stprintf(szOption, TEXT("MRU%d"), i);
data/unzip-6.0/wince/winmain.cpp:2338:10:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         _stprintf(szOption, TEXT("MRU%d"), ++j);
data/unzip-6.0/wince/winmain.cpp:2407:7:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
      _stprintf(szOption, TEXT("MRU%d"), i+1);
data/unzip-6.0/wince/winmain.cpp:2427:13:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
            _stprintf(szOption, TEXT("MRU%d"), ++j);
data/unzip-6.0/wince/winmain.cpp:2434:10:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         _stprintf(szOption, TEXT("MRU%d"), j);
data/unzip-6.0/wince/winmain.cpp:2593:7:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
      _stprintf(szError, TEXT("Failure loading \"%s\".\n\n"), wszPath);
data/unzip-6.0/wince/winmain.cpp:2594:7:  [4] (buffer) _tcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
      _tcscat(szError, GetZipErrorString(result));
data/unzip-6.0/wince/winmain.cpp:2664:26:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
            MergeValues(&system,    (pFile->dwAttributes & FILE_ATTRIBUTE_SYSTEM)     != 0);
data/unzip-6.0/wince/winmain.cpp:2708:13:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
            _stprintf(szBuffer, TEXT("%u items selected."), dwCount);
data/unzip-6.0/wince/winmain.cpp:2722:13:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
            _stprintf(szBuffer, TEXT("0x%08X"), dwCRC);
data/unzip-6.0/wince/winmain.cpp:2728:10:  [4] (buffer) _tcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
         _tcscat(szBuffer, (dwCount > 1) ? TEXT(" bytes total") : TEXT(" bytes"));
data/unzip-6.0/wince/winmain.cpp:2733:10:  [4] (buffer) _tcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
         _tcscat(szBuffer, (dwCount > 1) ? TEXT(" bytes total") : TEXT(" bytes"));
data/unzip-6.0/wince/winmain.cpp:2738:10:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         _stprintf(szBuffer, TEXT("%d.%d%%"), factor / 10,
data/unzip-6.0/wince/winmain.cpp:2751:50:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
         CheckThreeStateBox(hDlg, IDC_SYSTEM,    system);
data/unzip-6.0/wince/winmain.cpp:2758:33:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         psz += ((month  < 0) ? _stprintf(psz, TEXT("?\?/")) :
data/unzip-6.0/wince/winmain.cpp:2759:33:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
                                _stprintf(psz, TEXT("%u/"), month));
data/unzip-6.0/wince/winmain.cpp:2760:33:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         psz += ((day    < 0) ? _stprintf(psz, TEXT("?\?/")) :
data/unzip-6.0/wince/winmain.cpp:2761:33:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
                                _stprintf(psz, TEXT("%u/"), day));
data/unzip-6.0/wince/winmain.cpp:2762:33:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         psz += ((year   < 0) ? _stprintf(psz, TEXT("?\? ")) :
data/unzip-6.0/wince/winmain.cpp:2763:33:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
                                _stprintf(psz, TEXT("%u "), year % 100));
data/unzip-6.0/wince/winmain.cpp:2764:33:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         psz += ((hour   < 0) ? _stprintf(psz, TEXT("?\?:")) :
data/unzip-6.0/wince/winmain.cpp:2765:33:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
                                _stprintf(psz, TEXT("%u:"), hour));
data/unzip-6.0/wince/winmain.cpp:2766:33:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         psz += ((minute < 0) ? _stprintf(psz, TEXT("?\? ")) :
data/unzip-6.0/wince/winmain.cpp:2767:33:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
                                _stprintf(psz, TEXT("%02u "), minute));
data/unzip-6.0/wince/winmain.cpp:2768:33:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         psz += ((pm     < 0) ? _stprintf(psz, TEXT("?M")) :
data/unzip-6.0/wince/winmain.cpp:2769:33:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
                                _stprintf(psz, TEXT("%cM"), pm ? TEXT('P') : TEXT('A')));
data/unzip-6.0/wince/winmain.cpp:2789:13:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
            _stprintf(szBuffer, TEXT("%u of the selected files %s a comment."),
data/unzip-6.0/wince/winmain.cpp:3035:4:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
   _tcscpy(szInitialDir, szPath);
data/unzip-6.0/wince/winmain.cpp:3473:4:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
   _stprintf(szBuffer, TEXT("%u%%"), dwPercentage);
data/unzip-6.0/wince/winmain.cpp:3487:7:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
      _tcscpy(szBuffer, pei->fExtract ? TEXT("Extract") : TEXT("Test"));
data/unzip-6.0/wince/winmain.cpp:3511:7:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
      _stprintf(szMessage,
data/unzip-6.0/wince/winmain.cpp:3552:10:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         _stprintf(szMessage, TEXT("\"%S\" already exists."), (LPCSTR)lParam);
data/unzip-6.0/wince/winmain.cpp:3554:10:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         _stprintf(szMessage, TEXT("\"%s\" already exists."), (LPCSTR)lParam);
data/unzip-6.0/wince/winmain.cpp:3623:10:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         _stprintf(szMessage, TEXT("\"%S\" is encrypted."), pdi->szFile);
data/unzip-6.0/wince/winmain.cpp:3625:10:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         _stprintf(szMessage, TEXT("\"%s\" is encrypted."), pdi->szFile);
data/unzip-6.0/wince/winmain.cpp:3636:13:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
            _stprintf(szMessage, TEXT("Password was incorrect. Please re-enter (%d/%d)."),
data/unzip-6.0/wince/winmain.cpp:3731:16:  [4] (buffer) _tcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
               _tcscpy(szInitialDir, szApp);
data/unzip-6.0/wince/winmain.cpp:3854:10:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         _stprintf(szBuffer, TEXT("Freeware Version %S"), VER_FULLVERSION_STR);
data/unzip-6.0/wince/winmain.cpp:3856:10:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         _stprintf(szBuffer, TEXT("Freeware Version %s"), VER_FULLVERSION_STR);
data/unzip-6.0/wince/winmain.cpp:3859:10:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         _stprintf(szBuffer, TEXT("Developed by %s"), TEXT(VER_DEVELOPER_STR));
data/unzip-6.0/wince/winmain.cpp:3863:10:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
         _stprintf(szBuffer, TEXT("%S"), VER_COMMENT_STR);
data/unzip-6.0/windll/guisfx/sfxwiz.c:333:17:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
                lstrcpy(szTarget,ofn.lpstrFile);
data/unzip-6.0/windll/guisfx/sfxwiz.c:456:1:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
sprintf(sz, "%s is encrypted", name);
data/unzip-6.0/windll/guisfx/sfxwiz.c:560:1:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
lstrcpy(zfn, szThisApp);
data/unzip-6.0/windll/guisfx/sfxwiz.c:565:4:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
   lstrcpy(szAppName, ptr);
data/unzip-6.0/windll/guisfx/sfxwiz.c:567:4:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
   lstrcpy(szTarget, szThisApp);
data/unzip-6.0/windll/uzexampl.c:183:4:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
   lstrcpy(szFullPath, ofs.szPathName);
data/unzip-6.0/windll/uzexampl.c:454:4:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
   lstrcpy(szCompFactor, CompFactor100);
data/unzip-6.0/windll/uzexampl.c:456:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
   sprintf(szCompFactor, CompFactorStr, sgn, cfactor);
data/unzip-6.0/windll/windll.c:151:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy((*pargVee)[i], cmd);
data/unzip-6.0/windll/windll.c:179:5:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    lstrcpy(str1, s);
data/unzip-6.0/windll/windll.c:222:9:  [4] (buffer) lstrcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
        lstrcat(str1, str3);
data/unzip-6.0/windll/windll.c:237:13:  [4] (buffer) lstrcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
            lstrcat(str1, str3);
data/unzip-6.0/windll/windll.c:246:9:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
        lstrcpy(str1, str3); // Dump the leading space
data/unzip-6.0/windll/windll.c:436:5:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    lstrcpy(G.wildzipfn, lpDCL->lpszZipFN);
data/unzip-6.0/windll/windll.c:1033:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(sz, pattern);
data/unzip-6.0/windll/windll.c:1036:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(sz, pattern);
data/unzip-6.0/zipinfo.c:1058:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(unkn, LoadFarString(UnknownNo),
data/unzip-6.0/zipinfo.c:1075:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(unkn, LoadFarString(UnknownNo),
data/unzip-6.0/zipinfo.c:1086:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(unkn, LoadFarString(UnknownNo), G.crec.compression_method);
data/unzip-6.0/zipinfo.c:1242:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(attribs, LoadFarStringSmall(fpFtyp));
data/unzip-6.0/zipinfo.c:1272:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(attribs, LoadFarStringSmall(fpFtyp));
data/unzip-6.0/zipinfo.c:1581:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                            strcpy(types, LoadFarString(UTmodification));
data/unzip-6.0/zipinfo.c:1588:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                            strcpy(types+len, LoadFarString(UTaccess));
data/unzip-6.0/zipinfo.c:1597:29:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                            strcpy(types+len, LoadFarString(UTcreation));
data/unzip-6.0/zipinfo.c:2283:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            return (strcpy(d_t_str, LoadFarString(lngYMDHMSTimeError)));
data/unzip-6.0/zipinfo.c:2307:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(monthbuf, LoadFarString(BogusFmt), mo);
data/unzip-6.0/zipinfo.c:2313:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(d_t_str, LoadFarString(lngYMDHMSTime), yr+1900, monthstr, dy,
data/unzip-6.0/zipinfo.c:2316:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(d_t_str, LoadFarString(DecimalTime), yr+1900, mo, dy,
data/unzip-6.0/zipinfo.c:2319:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(d_t_str, LoadFarString(shtYMDHMTime), yr%100, monthstr, dy,
data/unzip-6.0/acorn/riscos.c:250:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
 envptr = getenv(envstr);
data/unzip-6.0/amiga/amiga.h:114:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#    undef getenv
data/unzip-6.0/amiga/filedate.c:192:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
char *getenv(const char *var);
data/unzip-6.0/amiga/filedate.c:322:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
char *getenv(const char *var)         /* not reentrant! */
data/unzip-6.0/amiga/filedate.c:390:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    exists = (void *)getenv(TZ_ENVVAR);
data/unzip-6.0/cmsmvs/vmmvs.c:56:23:  [3] (tmpfile) tmpnam:
  Temporary file race condition (CWE-377).
      if ((G.tempfn = tmpnam(NULL)) == NULL) return NULL;
data/unzip-6.0/crypt.c:247:9:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        srand((unsigned)time(NULL) ^ ZCR_SEED2);
data/unzip-6.0/envargs.c:42:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
extern char *getenv();
data/unzip-6.0/envargs.c:62:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((envptr = getenv(envstr)) != (char *)NULL)        /* usual var */
data/unzip-6.0/envargs.c:66:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if ((envptr = getenv(envstr2)) != (char *)NULL)   /* alternate var */
data/unzip-6.0/macos/source/getenv.c:86:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
char *getenv(const char *name);
data/unzip-6.0/macos/source/getenv.c:271:7:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
char *getenv(const char *name)
data/unzip-6.0/macos/source/getenv.c:381:1:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
getenv(" ");
data/unzip-6.0/msdos/msdos.c:1803:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *var = getenv("OS");
data/unzip-6.0/msdos/msdos.c:1814:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    var = getenv("windir");
data/unzip-6.0/process.c:297:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
             (((tmp = getenv("TZ")) != NULL) && (*tmp != '\0'))
data/unzip-6.0/qdos/makesfx.c:108:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while((c = getopt(ac, av, "o:z:x:s:h")) != EOF)
data/unzip-6.0/timezone.c:482:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    TZstring = getenv("TZ");    /* read TZ envvar */
data/unzip-6.0/ttyio.c:403:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *envptr, *getenv();
data/unzip-6.0/ttyio.c:411:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        envptr = getenv("LINES");
data/unzip-6.0/ttyio.c:421:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        envptr = getenv("COLUMNS");
data/unzip-6.0/unzip.c:2327:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
extern char *getenv();
data/unzip-6.0/unzip.c:2596:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        envptr = getenv(LoadFarStringSmall(EnvUnZip));
data/unzip-6.0/unzip.c:2601:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        envptr = getenv(LoadFarStringSmall(EnvUnZip2));
data/unzip-6.0/unzip.c:2606:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        envptr = getenv(LoadFarStringSmall(EnvZipInfo));
data/unzip-6.0/unzip.c:2611:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        envptr = getenv(LoadFarStringSmall(EnvZipInfo2));
data/unzip-6.0/unzip.c:2618:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        envptr = getenv(LoadFarStringSmall(EnvEMX));
data/unzip-6.0/unzip.c:2623:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        envptr = getenv(LoadFarStringSmall(EnvEMXOPT));
data/unzip-6.0/unzip.c:2630:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        envptr = getenv(LoadFarStringSmall(EnvGO32));
data/unzip-6.0/unzip.c:2635:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        envptr = getenv(LoadFarStringSmall(EnvGO32TMP));
data/unzip-6.0/unzip.c:2643:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        envptr = getenv(LoadFarStringSmall(EnvUnZipExts));
data/unzip-6.0/win32/nt.c:123:9:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
        InitializeCriticalSection( &VolumeCapsLock );
data/unzip-6.0/win32/nt.c:344:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    EnterCriticalSection( &VolumeCapsLock );
data/unzip-6.0/win32/nt.c:385:9:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
        EnterCriticalSection( &VolumeCapsLock );
data/unzip-6.0/win32/rsxntwin.h:158:13:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
VOID WINAPI InitializeCriticalSection();
data/unzip-6.0/windll/uzexampl.c:244:13:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
hUnzipDll = LoadLibrary(UNZ_DLL_NAME);
data/unzip-6.0/acorn/acorn.c:67:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char *dirname, matchname[FILNAMSIZ];
data/unzip-6.0/acorn/acorn.c:361:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathcomp[FILNAMSIZ];      /* path-component buffer */
data/unzip-6.0/acorn/acorn.c:814:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmpstr[16];
data/unzip-6.0/acorn/acorn.c:815:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ftypestr[32];
data/unzip-6.0/acorn/acorn.c:817:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(tmpstr,"File$Type_%03x",(block->loadaddr & 0x000FFF00) >> 8);
data/unzip-6.0/acorn/riscos.c:184:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char canon[256];
data/unzip-6.0/acorn/riscos.c:241:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char str[256];
data/unzip-6.0/acorn/riscos.c:287:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char ext[MAXEXT];
data/unzip-6.0/acorn/riscos.h:18:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errmess[252];
data/unzip-6.0/acorn/riscos.h:59:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char d_name[MAXFILENAMELEN]; /* name */
data/unzip-6.0/acorn/riscos.h:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[13];
data/unzip-6.0/amiga/amiga.c:324:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathcomp[FILNAMSIZ];   /* path-component buffer */
data/unzip-6.0/amiga/amiga.c:856:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char devname[32], *debna;
data/unzip-6.0/amiga/amiga.c:962:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf1[16];  /* compiler name */
data/unzip-6.0/amiga/amiga.c:963:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf2[16];  /* revstamp */
data/unzip-6.0/amiga/amiga.c:964:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf3[16];  /* OS */
data/unzip-6.0/amiga/amiga.c:965:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf4[16];  /* Date */
data/unzip-6.0/amiga/amiga.c:972:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(buf1,"SAS/C ");
data/unzip-6.0/amiga/amiga.c:975:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(buf1,"Lattice C ");
data/unzip-6.0/amiga/amiga.c:978:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(buf1,"Manx Aztec C ");
data/unzip-6.0/amiga/amiga.c:980:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(buf1,"UNKNOWN ");
data/unzip-6.0/amiga/amiga.c:985:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf3,"AmigaDOS v%d",WBversion);
data/unzip-6.0/amiga/amiga.c:987:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(buf1,"Unknown compiler ");
data/unzip-6.0/amiga/amiga.c:988:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(buf3,"Unknown OS");
data/unzip-6.0/amiga/amiga.c:997:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf2,"version %d.%d",__VERSION__,__REVISION__);
data/unzip-6.0/amiga/amiga.c:1000:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf2,"version %d",__VERSION__);
data/unzip-6.0/amiga/amiga.c:1002:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf2,"unknown version");
data/unzip-6.0/amiga/amiga.c:1009:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(buf4," unknown date");
data/unzip-6.0/amiga/amiga.h:175:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *(filenotes[DIR_BLKSIZ]);\
data/unzip-6.0/amiga/amiga.h:180:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *dirname, matchname[FILNAMSIZ];\
data/unzip-6.0/amiga/filedate.c:324:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char space[ENVSIZE];
data/unzip-6.0/amiga/filedate.c:387:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char put_tz[MAXTIMEZONELEN];  /* string for putenv: "TZ=aaabbb:bb:bbccc" */
data/unzip-6.0/amiga/filedate.c:394:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(put_tz, "GMT%+ld", time_zone / 3600L);
data/unzip-6.0/amiga/filedate.c:397:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(put_tz + strlen(put_tz), ":%02d", offset / 60);
data/unzip-6.0/amiga/filedate.c:399:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(put_tz + strlen(put_tz), ":%02d", offset % 60);
data/unzip-6.0/amiga/filedate.c:402:13:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
            strcat(put_tz,"DST");
data/unzip-6.0/amiga/filedate.c:583:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char longspace[8];
data/unzip-6.0/amiga/makesfx.c:136:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (!(arch = fopen(argv[2], "rb"))) {
data/unzip-6.0/amiga/makesfx.c:148:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (!(tool = fopen(toolname, "rb"))) {
data/unzip-6.0/amiga/makesfx.c:151:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if (!(tool = fopen(toolname, "rb"))) {
data/unzip-6.0/amiga/makesfx.c:161:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (!(out = fopen(argv[1], "wb"))) {
data/unzip-6.0/aosvs/aosvs.c:67:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char           vs_resname[2*$MXPL];
data/unzip-6.0/aosvs/aosvs.c:68:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char           vs_path[2*$MXPL];     /* buf for AOS/VS pathname */
data/unzip-6.0/aosvs/aosvs.c:69:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char           Vs_path[512];         /* should be big enough [GRR: ?] */
data/unzip-6.0/aosvs/aosvs.c:86:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define opendir(path) fopen(path,"r")
data/unzip-6.0/aosvs/aosvs.c:123:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char *dirname, matchname[FILNAMSIZ];
data/unzip-6.0/aosvs/aosvs.c:285:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((char *) &zzextrafld, G.extra_field, sizeof(zzextrafld));
data/unzip-6.0/aosvs/aosvs.c:360:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((G.outfile = fopen(G.filename, FOPW)) == (FILE *)NULL) {
data/unzip-6.0/aosvs/aosvs.c:533:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathcomp[FILNAMSIZ];      /* path-component buffer */
data/unzip-6.0/aosvs/aosvs.c:671:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(pathcomp, "__");
data/unzip-6.0/aosvs/aosvs.c:689:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(pathcomp+strlen(pathcomp), ",%03x", (int)(ft>>8) & 0xFFF);
data/unzip-6.0/aosvs/aosvs.c:1126:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cc_namebuf[40];
data/unzip-6.0/aosvs/aosvs.c:1127:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cc_versbuf[40];
data/unzip-6.0/aosvs/aosvs.c:1130:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cc_versbuf[40];
data/unzip-6.0/aosvs/aosvs.c:1134:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char os_namebuf[40];
data/unzip-6.0/aosvs/aosvs.c:1137:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char os_namebuf[40];
data/unzip-6.0/aosvs/aosvs.c:1146:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(cc_namebuf, "NeXT DevKit %d.%02d ",
data/unzip-6.0/aosvs/aosvs.c:1156:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      "cc ", (sprintf(cc_versbuf, "version %d", _RELEASE), cc_versbuf),
data/unzip-6.0/aosvs/aosvs.c:1213:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(os_namebuf, " (Cray UNICOS release %d)", _UNICOS), os_namebuf),
data/unzip-6.0/aosvs/aosvs.c:1246:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(os_namebuf, " (NetBSD 0.8%c)", (char)(NetBSD0_8 - 1 + 'A')),
data/unzip-6.0/aosvs/aosvs.c:1250:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(os_namebuf, " (NetBSD 0.9%c)", (char)(NetBSD0_9 - 1 + 'A')),
data/unzip-6.0/aosvs/aosvs.c:1254:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(os_namebuf, " (NetBSD 1.0%c)", (char)(NetBSD1_0 - 1 + 'A')),
data/unzip-6.0/aosvs/aosvs.h:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            extra_header_id[2];   /* set to VS - in theory, an int */
data/unzip-6.0/aosvs/aosvs.h:61:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            extra_data_size[2];   /* size of rest (little-endian) */
data/unzip-6.0/aosvs/aosvs.h:62:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            extra_sentinel[4];    /* set to FCI w/ trailing null */
data/unzip-6.0/aosvs/aosvs.h:65:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            aclbuf[$MXACL];       /* the raw ACL */
data/unzip-6.0/api.c:389:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *incname[2];
data/unzip-6.0/api.c:492:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(G.redirect_pointer, rawbuf, size);
data/unzip-6.0/atari/atari.c:55:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char *dirname, matchname[FILNAMSIZ];
data/unzip-6.0/atari/atari.c:334:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathcomp[FILNAMSIZ];      /* path-component buffer */
data/unzip-6.0/atari/atari.c:472:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(pathcomp, "__");
data/unzip-6.0/atari/atari.c:490:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(pathcomp+strlen(pathcomp), ",%03x", (int)(ft>>8) & 0xFFF);
data/unzip-6.0/atari/atari.c:981:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[40];
data/unzip-6.0/atari/atari.c:990:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      "cc ", (sprintf(buf, " version %d", _RELEASE), buf),
data/unzip-6.0/atari/atari.c:993:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      "Turbo C", (sprintf(buf, " (0x%04x = %d)", __TURBOC__, __TURBOC__), buf),
data/unzip-6.0/atheos/athcfg.h:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *dirname, matchname[FILNAMSIZ];\
data/unzip-6.0/atheos/atheos.c:58:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fnbuf[1];              /* buffer stub for directory name */
data/unzip-6.0/atheos/atheos.c:408:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathcomp[FILNAMSIZ];      /* path-component buffer */
data/unzip-6.0/atheos/atheos.c:563:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(pathcomp, "__");
data/unzip-6.0/atheos/atheos.c:581:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(pathcomp+strlen(pathcomp), ",%03x", (int)(ft>>8) & 0xFFF);
data/unzip-6.0/atheos/atheos.c:986:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(slnk_entry->buf, AtheOS_exfld, AtheOSef_len);
data/unzip-6.0/atheos/atheos.c:1281:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(name, O_RDWR | O_NOTRAVERSE);
data/unzip-6.0/atheos/atheos.c:1297:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&fa_info, ptr, sizeof(struct attr_info));
data/unzip-6.0/beos/beocfg.h:51:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *dirname, matchname[FILNAMSIZ];\
data/unzip-6.0/beos/beos.c:72:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fnbuf[1];              /* buffer stub for directory name */
data/unzip-6.0/beos/beos.c:439:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathcomp[FILNAMSIZ];      /* path-component buffer */
data/unzip-6.0/beos/beos.c:596:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(pathcomp, "__");
data/unzip-6.0/beos/beos.c:614:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(pathcomp+strlen(pathcomp), ",%03x", (int)(ft>>8) & 0xFFF);
data/unzip-6.0/beos/beos.c:1024:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(slnk_entry->buf, BeOS_exfld, BeOSef_len);
data/unzip-6.0/beos/beos.c:1089:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                Info(slide, 0x201, ((char *)slide, CannotSetItemUidGid,
data/unzip-6.0/beos/beos.c:1093:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                Info(slide, 0x201, ((char *)slide, CannotSetUidGid,
data/unzip-6.0/beos/beos.c:1327:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(name, O_RDWR | O_NOTRAVERSE);
data/unzip-6.0/beos/beos.c:1343:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&fa_info, ptr, sizeof(struct attr_info));
data/unzip-6.0/beos/beos.c:1532:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buff[PATH_MAX], cwd_buff[PATH_MAX];
data/unzip-6.0/cmsmvs/vmmvs.c:45:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fzip = fopen(G.zipfn, FOPR);
data/unzip-6.0/cmsmvs/vmmvs.c:50:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ((fzip = fopen(G.zipfn,"rb,recfm=fb")) == NULL) {
data/unzip-6.0/cmsmvs/vmmvs.c:57:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((in = fopen(G.zipfn,"rb")) != NULL &&
data/unzip-6.0/cmsmvs/vmmvs.c:58:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          (out = fopen(G.tempfn,"wb,recfm=fb,lrecl=1")) != NULL) {
data/unzip-6.0/cmsmvs/vmmvs.c:75:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fzip = fopen(G.tempfn,"rb,recfm=fb");
data/unzip-6.0/cmsmvs/vmmvs.c:98:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char type[100];
data/unzip-6.0/cmsmvs/vmmvs.c:102:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char basefilename[PATH_MAX], *p;
data/unzip-6.0/cmsmvs/vmmvs.c:112:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    exists = fopen(basefilename, FOPR);
data/unzip-6.0/cmsmvs/vmmvs.c:155:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((G.outfile = fopen(G.filename, mode)) == NULL) {
data/unzip-6.0/cmsmvs/vmmvs.c:212:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(type, ",recfm=");
data/unzip-6.0/cmsmvs/vmmvs.c:221:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(type+strlen(type), ",lrecl=%ld", fdata->__recfmV
data/unzip-6.0/cmsmvs/vmmvs.c:227:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
       sprintf(type+strlen(type), ",blksize=%ld", fdata->__blksize);
data/unzip-6.0/cmsmvs/vmmvs.c:230:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(type+strlen(type), ",blksize=%ld", fdata->__blksize);
data/unzip-6.0/cmsmvs/vmmvs.c:249:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char filename[256];
data/unzip-6.0/cmsmvs/vmmvs.c:294:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char newname[FILNAMSIZ], *lbar;
data/unzip-6.0/cmsmvs/vmmvs.c:358:8:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
       strcat(G.filename, ".NONAME");
data/unzip-6.0/cmsmvs/vmmvs.c:432:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
           char newfilename[PATH_MAX];
data/unzip-6.0/cmsmvs/vmmvs.c:500:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((stream = fopen(filename, FOPR)) != NULL) {
data/unzip-6.0/cmsmvs/vmmvs.c:517:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fname[PATH_MAX];
data/unzip-6.0/cmsmvs/vmmvs.c:520:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ((fp = fopen(path, FOPR)) != NULL) {
data/unzip-6.0/cmsmvs/vmmvs.c:558:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *argv[50];
data/unzip-6.0/cmsmvs/vmmvs.c:561:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char argstr[256];
data/unzip-6.0/cmsmvs/vmmvs.c:574:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(argstr, pCmdStart, iArgLen);
data/unzip-6.0/cmsmvs/vmmvs.c:602:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char liblvlmsg [50+1];
data/unzip-6.0/cmsmvs/vmmvs.c:605:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char complevel[64];
data/unzip-6.0/cmsmvs/vmmvs.c:648:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(complevel," V%dR%dM%d",
data/unzip-6.0/cmsmvs/vmmvs.c:652:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(complevel," V%dR%d", __IBMC__ / 100, (__IBMC__ % 100)/10);
data/unzip-6.0/crypt.c:609:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(hh, h, RAND_HEAD_LEN);
data/unzip-6.0/explode.c:339:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(redirSlide + w, redirSlide + d, e);
data/unzip-6.0/explode.c:457:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(redirSlide + w, redirSlide + d, e);
data/unzip-6.0/extract.c:144:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static ZCONST char Far *ComprNames[NUM_METHODS] = {
data/unzip-6.0/extract.c:1704:25:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                        strcpy(G.answerbuf, "{ENTER}");
data/unzip-6.0/extract.c:2350:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                            Info(slide, 1, ((char *)slide,
data/unzip-6.0/extract.c:2523:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((char *)tgt, (char *)G.inptr, (extent)G.incnt);
data/unzip-6.0/extract.c:2597:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char *)G.outbufptr, (char *)rawbuf, (extent)size);
data/unzip-6.0/extract.c:2649:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((char *)ucdata, (ZCONST char *)init, needlen);
data/unzip-6.0/extract.c:2654:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ucdata, ebdata+EB_IZVMS_HLEN, usiz);
data/unzip-6.0/extract.c:2883:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy((char *)se, "...");
data/unzip-6.0/fileio.c:230:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    G.zipfd = open(G.zipfn, O_RDONLY, 0, OPNZIP_RMS_ARGS);
data/unzip-6.0/fileio.c:233:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    G.zipfd = open(G.zipfn, 0);
data/unzip-6.0/fileio.c:239:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    G.zipfd = fopen(G.zipfn, FOPR);
data/unzip-6.0/fileio.c:241:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    G.zipfd = open(G.zipfn, O_RDONLY | O_BINARY);
data/unzip-6.0/fileio.c:287:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        FILE *tmp = fopen(G.filename, "wb+");
data/unzip-6.0/fileio.c:356:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf(numtail,"%u", ++i);
data/unzip-6.0/fileio.c:412:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((G.outfile = fopen(tfilnam, FOPW)) == (FILE *)NULL) {
data/unzip-6.0/fileio.c:602:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf, G.inptr, count);
data/unzip-6.0/fileio.c:1746:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char temp[20];
data/unzip-6.0/fileio.c:1783:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf (temp, "%02d/%02d/%02d %02d:%02d:%02d", mo+1, dy+1, yr, hh, mm, ss);
data/unzip-6.0/fileio.c:2026:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp_fnote[2 * AMIGA_FILENOTELEN];   /* extra room for squozen chars */
data/unzip-6.0/fileio.c:2522:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fmt[16];
data/unzip-6.0/fileio.c:2665:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
zvoid *memcpy(dst, src, len)
data/unzip-6.0/flexos/flexos.c:85:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char *dirname, matchname[FILNAMSIZ];
data/unzip-6.0/flexos/flexos.c:249:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathcomp[FILNAMSIZ];      /* path-component buffer */
data/unzip-6.0/funzip.c:347:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((G.in = fopen(*argv, FOPR)) == (FILE *)NULL)
data/unzip-6.0/globals.c:30:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char central_hdr_sig[4]   = {0, 0, 0x01, 0x02};
data/unzip-6.0/globals.c:31:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char local_hdr_sig[4]     = {0, 0, 0x03, 0x04};
data/unzip-6.0/globals.c:32:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char end_central_sig[4]   = {0, 0, 0x05, 0x06};
data/unzip-6.0/globals.c:33:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char end_central64_sig[4] = {0, 0, 0x06, 0x06};
data/unzip-6.0/globals.c:34:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char end_centloc64_sig[4] = {0, 0, 0x06, 0x07};
data/unzip-6.0/globals.c:37:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
ZCONST char *fnames[2] = {"*", NULL};   /* default filenames vector */
data/unzip-6.0/globals.h:219:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sig[4];
data/unzip-6.0/globals.h:220:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char answerbuf[10];
data/unzip-6.0/globals.h:297:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     filename[FILNAMSIZ];  /* also used by NT for temporary SFX path */
data/unzip-6.0/globals.h:354:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fzofft_buf[FZOFFT_NUM][FZOFFT_LEN];
data/unzip-6.0/globals.h:358:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char rgchBigBuffer[512];
data/unzip-6.0/globals.h:359:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char rgchSmallBuffer[96];
data/unzip-6.0/globals.h:360:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char rgchSmallBuffer2[160];  /* boosted to 160 for local3[] in unzip.c */
data/unzip-6.0/globals.h:382:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char autorun_command[FILNAMSIZ];
data/unzip-6.0/globals.h:404:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char local_hdr_sig[4];
data/unzip-6.0/globals.h:405:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char central_hdr_sig[4];
data/unzip-6.0/globals.h:406:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char end_central_sig[4];
data/unzip-6.0/globals.h:407:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char end_central32_sig[4];
data/unzip-6.0/globals.h:408:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char end_central64_sig[4];
data/unzip-6.0/globals.h:409:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char end_centloc64_sig[4];
data/unzip-6.0/human68k/human68k.c:62:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char *dirname, matchname[FILNAMSIZ];
data/unzip-6.0/human68k/human68k.c:236:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathcomp[FILNAMSIZ];      /* path-component buffer */
data/unzip-6.0/human68k/human68k.c:902:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (((fd = open((char *)fname, 0)) == -1) ||
data/unzip-6.0/human68k/human68k.c:930:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[40];
data/unzip-6.0/human68k/human68k.c:939:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      "cc ", (sprintf(buf, " version %d", _RELEASE), buf),
data/unzip-6.0/human68k/human68k.c:969:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char argv0[92];
data/unzip-6.0/inflate.c:1021:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(redirSlide + (unsigned)w, redirSlide + d, e);
data/unzip-6.0/list.c:100:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sgn, cfactorstr[12];
data/unzip-6.0/list.c:119:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methbuf[8];
data/unzip-6.0/list.c:121:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static ZCONST char Far method[NUM_METHODS+1][8] =
data/unzip-6.0/list.c:152:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            Info(slide, 0, ((char *)slide, LoadFarString(CaseConversion),
data/unzip-6.0/list.c:350:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf( &methbuf[ 4], "%03u", G.crec.compression_method);
data/unzip-6.0/list.c:352:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf( &methbuf[ 3], "%04X", G.crec.compression_method);
data/unzip-6.0/macos/source/charmap.h:42:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
ZCONST unsigned char MacRoman_to_WinCP1252[128] = {
data/unzip-6.0/macos/source/charmap.h:176:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
ZCONST unsigned char WinCP1252_to_MacRoman[128] = {
data/unzip-6.0/macos/source/getenv.c:59:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char CompletePath[NAME_MAX];
data/unzip-6.0/macos/source/getenv.c:224:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char cmd[MAX_COMMAND];
data/unzip-6.0/macos/source/helpers.c:40:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern ZCONST unsigned char MacRoman_to_WinCP1252[128];
data/unzip-6.0/macos/source/helpers.c:43:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char         argStr[1024];
data/unzip-6.0/macos/source/helpers.c:44:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char         *argv[MAX_ARGS + 1];
data/unzip-6.0/macos/source/helpers.c:146:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char str[sizeof(value)*8];
data/unzip-6.0/macos/source/helpers.c:291:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char VolumeName[257], volume[257];
data/unzip-6.0/macos/source/helpers.c:460:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char VolName[257];
data/unzip-6.0/macos/source/macbin3.c:293:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char header[128];
data/unzip-6.0/macos/source/macbin3.c:373:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat((char*)file->name, ".bin");
data/unzip-6.0/macos/source/macbin3.c:408:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    buffer[128];
data/unzip-6.0/macos/source/macbin3.c:409:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    header[128];
data/unzip-6.0/macos/source/macbin3.c:410:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    comment[256];
data/unzip-6.0/macos/source/macbin3.c:575:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(McBin_source.name,source->name,source->name[0]+1);
data/unzip-6.0/macos/source/macbin3.c:621:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    header[128];
data/unzip-6.0/macos/source/macbin3.c:622:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    comment[256];
data/unzip-6.0/macos/source/macbin3.c:638:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(header, *data, 128);
data/unzip-6.0/macos/source/macbin3.c:656:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( destination->name,
data/unzip-6.0/macos/source/macbin3.c:751:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(comment,*data + rfOffset, commentLength);
data/unzip-6.0/macos/source/maccfg.h:70:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define open            macopen
data/unzip-6.0/macos/source/macdir.c:62:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char CompletePath[NAME_MAX];
data/unzip-6.0/macos/source/macdir.c:134:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[256];
data/unzip-6.0/macos/source/macdir.h:44:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            d_name[NAME_MAX + 1];
data/unzip-6.0/macos/source/macos.c:81:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char ResourceMark[13]; /* var is initialized in file pathname.c */
data/unzip-6.0/macos/source/macos.c:200:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char *dirname, matchname[FILNAMSIZ];
data/unzip-6.0/macos/source/macos.c:401:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathcomp[FILNAMSIZ];      /* path-component buffer */
data/unzip-6.0/macos/source/macos.c:940:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char DateTime[50];
data/unzip-6.0/macos/source/macos.c:943:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char CompVer[10];
data/unzip-6.0/macos/source/macos.c:944:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(CompVer, "%x", __MWERKS__);
data/unzip-6.0/macos/source/macos.c:990:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char CompletePath[NAME_MAX], CompletePath2[NAME_MAX];
data/unzip-6.0/macos/source/macos.c:1075:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char CompletePath[NAME_MAX];
data/unzip-6.0/macos/source/macos.c:1271:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char CompletePath[NAME_MAX];
data/unzip-6.0/macos/source/macos.c:1272:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ArchiveDir[NAME_MAX];
data/unzip-6.0/macos/source/macos.c:1307:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(CurrentFile.name, newExtraField.filename, newExtraField.filename[0]+1);
data/unzip-6.0/macos/source/macos.c:1898:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char buffer[14];
data/unzip-6.0/macos/source/macos.c:1940:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buffer,"Code: 0x%x",(short) script);
data/unzip-6.0/macos/source/macscreen.c:272:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(screenLine[endLine], "Press any key to continue ...", 29);
data/unzip-6.0/macos/source/macscreen.c:309:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(screenLine[endLine] + screenLength[endLine], t, n);
data/unzip-6.0/macos/source/macscreen.c:345:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(screenLine[endLine] + screenLength[endLine], t, k);
data/unzip-6.0/macos/source/macscreen.c:393:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[bufferSize];
data/unzip-6.0/macos/source/macscreen.c:413:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[bufferSize];
data/unzip-6.0/macos/source/macstat.c:62:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fullpath[NAME_MAX], UnmangledPath[NAME_MAX];
data/unzip-6.0/macos/source/macunzip.c:145:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char UnzipVersion[32], ZipinfoVersion[32];
data/unzip-6.0/macos/source/macunzip.c:158:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char fileList[256];
data/unzip-6.0/macos/source/macunzip.c:753:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char *s, **v, modifierString[32];
data/unzip-6.0/macos/source/macunzip.c:824:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&saveGlobals, &G, sizeof(Uz_Globs));
data/unzip-6.0/macos/source/macunzip.c:828:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&G, &saveGlobals, sizeof(Uz_Globs));
data/unzip-6.0/macos/source/pathname.c:121:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char buffer[NAME_MAX], *tmpPtr, *namePtr;
data/unzip-6.0/macos/source/pathname.c:264:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char buffer[255];
data/unzip-6.0/macos/source/pathname.c:628:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char currentdir[NAME_MAX];
data/unzip-6.0/macos/source/pathname.c:675:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char filename[35];  /* contents should be never longer than 32 chars */
data/unzip-6.0/macos/source/pathname.c:678:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char tempLongFilename[1024], charnum[5];
data/unzip-6.0/macos/source/pathname.c:710:1:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
sprintf(charnum,"~%x", Num);
data/unzip-6.0/macos/source/sxunzip.c:30:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char fileList[256];
data/unzip-6.0/macos/source/sxunzip.c:122:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char UnZipVersionLocal[50];
data/unzip-6.0/macos/source/sxunzip.c:136:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char UnzipVersion[200];
data/unzip-6.0/match.c:422:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pat[256], str[256];
data/unzip-6.0/msdos/msdos.c:192:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       char d_reserved[30];
data/unzip-6.0/msdos/msdos.c:193:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       char d_name[13];
data/unzip-6.0/msdos/msdos.c:230:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(nbuf+len, "/*.*");
data/unzip-6.0/msdos/msdos.c:282:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char *dirname, matchname[FILNAMSIZ];
data/unzip-6.0/msdos/msdos.c:452:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathcomp[FILNAMSIZ];      /* path-component buffer */
data/unzip-6.0/msdos/msdos.c:1247:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char res[5];      /* reserved */
data/unzip-6.0/msdos/msdos.c:1251:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dmmy[5];
data/unzip-6.0/msdos/msdos.c:1253:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dmmy2[9];
data/unzip-6.0/msdos/msdos.c:1647:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (((fd = open((char *)fname, 0)) == -1) ||
data/unzip-6.0/msdos/msdos.c:1829:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg_str[160];          /* enough space for two 79-char-lines  */
data/unzip-6.0/msdos/msdos.c:1853:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[80];
data/unzip-6.0/msdos/msdos.c:1860:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(buf, "djgpp v%d.%02d / gcc ", __DJGPP__, __DJGPP_MINOR__), buf),
data/unzip-6.0/msdos/msdos.c:1871:24:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      "Watcom C/C++", (sprintf(buf, " %d.%02d", __WATCOMC__ / 100,
data/unzip-6.0/msdos/msdos.c:1874:24:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      "Watcom C/C++", (sprintf(buf, " %d.%d", __WATCOMC__ / 100,
data/unzip-6.0/msdos/msdos.c:1930:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        (sprintf(buf, "%d.%02d", _MSC_VER/100, _MSC_VER%100), buf),
data/unzip-6.0/msdos/msdos.c:2417:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char newname[4];
data/unzip-6.0/netware/netware.c:94:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char *dirname, matchname[FILNAMSIZ];
data/unzip-6.0/netware/netware.c:344:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathcomp[FILNAMSIZ];      /* path-component buffer */
data/unzip-6.0/netware/netware.c:491:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(pathcomp+strlen(pathcomp), ",%03x", (int)(ft>>8) & 0xFFF);
data/unzip-6.0/netware/netware.c:831:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[80];
data/unzip-6.0/netware/netware.c:843:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      "Watcom C", (sprintf(buf, " (__WATCOMC__ = %d)", __WATCOMC__), buf),
data/unzip-6.0/netware/netware.c:869:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(buf, "%d.%02d", _MSC_VER/100, _MSC_VER%100), buf),
data/unzip-6.0/os2/os2.c:469:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char szName[CCHMAXPATH];
data/unzip-6.0/os2/os2.c:561:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char szName[CCHMAXPATH];
data/unzip-6.0/os2/os2.c:598:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pFEA, (PCH) pFEA2 + sizeof(pFEA2 -> oNextEntryOffset), nLength);
data/unzip-6.0/os2/os2.c:693:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char nbuf[MAXPATHLEN + 1];
data/unzip-6.0/os2/os2.c:707:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(nbuf+len, "\\.");
data/unzip-6.0/os2/os2.c:735:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(nbuf+len, "\\*");
data/unzip-6.0/os2/os2.c:895:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char bName[3];
data/unzip-6.0/os2/os2.c:949:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char *dirname, matchname[FILNAMSIZ];
data/unzip-6.0/os2/os2.c:1186:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathcomp[FILNAMSIZ];      /* path-component buffer */
data/unzip-6.0/os2/os2.c:1394:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(pathcomp+strlen(pathcomp), ",%03x", (int)(ft>>8) & 0xFFF);
data/unzip-6.0/os2/os2.c:1833:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char Name[3];
data/unzip-6.0/os2/os2.c:2026:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy((char *) fealst.szName, ".LONGNAME");
data/unzip-6.0/os2/os2.c:2171:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[80];
data/unzip-6.0/os2/os2.c:2185:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(buf, "C Set/2 %d.%02d", __IBMC__/100,__IBMC__%100), buf),
data/unzip-6.0/os2/os2.c:2187:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(buf, "C Set++ %d.%02d", __IBMC__/100,__IBMC__%100), buf),
data/unzip-6.0/os2/os2.c:2189:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(buf, "Visual Age C++ %d.%02d", __IBMC__/100,__IBMC__%100), buf),
data/unzip-6.0/os2/os2.c:2192:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      "Watcom C", (sprintf(buf, " (__WATCOMC__ = %d)", __WATCOMC__), buf),
data/unzip-6.0/os2/os2.c:2218:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(buf, "%d.%02d", _MSC_VER/100, _MSC_VER%100), buf),
data/unzip-6.0/os2/os2.c:2305:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char cUpperCase[256], cLowerCase[256];
data/unzip-6.0/os2/os2acl.c:87:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char acl_ugname[UNLEN+1];
data/unzip-6.0/os2/os2acl.c:202:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/unzip-6.0/os2/os2acl.c:238:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char cwd[CCHMAXPATH];
data/unzip-6.0/os2/os2acl.c:297:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  offs = sprintf(text, "ACL1:%X,%d\n",
data/unzip-6.0/os2/os2data.h:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char     d_name[MAXNAMLEN + 1];   /* null terminated */
data/unzip-6.0/os2/os2data.h:112:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *dirname, matchname[FILNAMSIZ];
data/unzip-6.0/os2/os2data.h:123:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[IBUF_LEN];
data/unzip-6.0/os2/os2data.h:124:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char output_var[MAXLEN];
data/unzip-6.0/os2/os2data.h:125:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char getvar_buf[MAXLEN];
data/unzip-6.0/os2/rexxapi.c:169:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(G.os2.getvar_buf+G.os2.getvar_len,"%d",index);
data/unzip-6.0/os2/rexxapi.c:185:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(G.os2.getvar_buf,name,G.os2.getvar_len+1);
data/unzip-6.0/os2/rexxapi.c:192:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  total = atoi(G.os2.buffer);
data/unzip-6.0/os2/rexxapi.c:271:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *incname[2];
data/unzip-6.0/os2/rexxapi.c:272:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *excname[2];
data/unzip-6.0/os2/rexxapi.c:474:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *incname[2];
data/unzip-6.0/os2/rexxapi.c:475:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *excname[2];
data/unzip-6.0/os2/rexxapi.c:615:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *argv[30];
data/unzip-6.0/os2/rexxapi.c:647:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(retstr->strptr, "%d", unzip(__G__ argc, argv));   /* a.k.a. MAIN() */
data/unzip-6.0/os2/rexxapi.c:657:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(G.os2.buffer+G.os2.putchar_idx,buf,size);
data/unzip-6.0/os2/rexxapi.c:771:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(G.os2.output_var+G.os2.stem_len,"%d",idx);
data/unzip-6.0/os2/rexxapi.c:784:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(G.os2.output_var+G.os2.stem_len,"%d",G.os2.output_idx);
data/unzip-6.0/os2/rexxapi.c:812:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buffer,scan,remaining);
data/unzip-6.0/os2/rexxapi.c:872:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          idx = atoi(G.os2.buffer)+1;
data/unzip-6.0/os2/rexxapi.c:874:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(ptr,"%d",idx);
data/unzip-6.0/process.c:1055:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char waste[4];
data/unzip-6.0/process.c:1163:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((char *)G.hold, (char *)G.inbuf, 3);
data/unzip-6.0/process.c:1195:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((char *)G.hold, (char *)G.inbuf, 3);
data/unzip-6.0/process.c:2298:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mb[6];
data/unzip-6.0/process.c:2414:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char d[3];
data/unzip-6.0/process.c:2415:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char e[11];
data/unzip-6.0/process.c:2435:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(d, "%02x", b[i]);
data/unzip-6.0/process.c:2507:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[9];
data/unzip-6.0/qdos/callstub.c:25:28:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef struct {short len; char chrs[1];} __QP_t;
data/unzip-6.0/qdos/callstub.c:27:36:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define __QA(l) struct {short len; char chrs[(l)+1];}
data/unzip-6.0/qdos/callstub.c:49:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy (s->chrs, (*q)->chrs, (*q)->len);
data/unzip-6.0/qdos/callstub.c:94:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char txt[PATH_MAX];
data/unzip-6.0/qdos/callstub.c:98:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(txt, tmp->chrs, tmp->len);
data/unzip-6.0/qdos/callstub.c:99:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(txt+tmp->len, "SFX_EXE", 8);
data/unzip-6.0/qdos/callstub.c:104:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(txt+tmp->len+4, "DAT", 4);
data/unzip-6.0/qdos/callstub.c:105:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(q+ds.sfxnam, txt, tmp->len+8);
data/unzip-6.0/qdos/callstub.c:134:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(basfil, tmpdir->chrs,tmpdir->len);
data/unzip-6.0/qdos/callstub.c:135:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(basfil+tmpdir->len,"SFX_BAS", 8);
data/unzip-6.0/qdos/callstub.c:139:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char *p,txt[80];
data/unzip-6.0/qdos/callstub.c:146:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, tmpdir->chrs, tmpdir->len);
data/unzip-6.0/qdos/callstub.c:148:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, "SFX_EXE;'-d ", 12);
data/unzip-6.0/qdos/callstub.c:150:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, outdir->chrs, outdir->len);
data/unzip-6.0/qdos/callstub.c:156:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(txt, "delete ", 7);
data/unzip-6.0/qdos/callstub.c:158:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, tmpdir->chrs, tmpdir->len);
data/unzip-6.0/qdos/callstub.c:160:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, "SFX_EXE\n", 8);
data/unzip-6.0/qdos/callstub.c:164:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, "DAT\n", 4);
data/unzip-6.0/qdos/callstub.c:166:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, "BAS\n", 4);
data/unzip-6.0/qdos/callstub.c:175:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char t3[80];
data/unzip-6.0/qdos/callstub.c:178:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, T3, T3LEN);
data/unzip-6.0/qdos/callstub.c:180:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy (p, basfil, tmpdir->len+7);
data/unzip-6.0/qdos/callstub.c:197:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char basfil[PATH_MAX];
data/unzip-6.0/qdos/izqdos.h:21:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        longid[8];
data/unzip-6.0/qdos/izqdos.h:33:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        longid[4];
data/unzip-6.0/qdos/makesfx.c:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            d_name[36] __attribute__ ((packed));/* name area */
data/unzip-6.0/qdos/makesfx.c:99:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char local_sig[4] = "PK\003\004";
data/unzip-6.0/qdos/makesfx.c:100:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *p, tmp[4];
data/unzip-6.0/qdos/makesfx.c:133:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if((fd = open(zf, O_RDONLY)) > 0)
data/unzip-6.0/qdos/makesfx.c:160:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if((fo = open(of, O_CREAT|O_TRUNC|O_RDWR, 0666)) != -1)
data/unzip-6.0/qdos/makesfx.c:168:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            if((fd = open(sf, O_RDONLY)) != -1)
data/unzip-6.0/qdos/makesfx.c:196:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            if((fd = open(xf, O_RDONLY)) != -1)
data/unzip-6.0/qdos/makesfx.c:219:30:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                    if((fd = open(zf, O_RDONLY)) > 0)
data/unzip-6.0/qdos/qdos.c:237:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char *dirname, matchname[FILNAMSIZ];
data/unzip-6.0/qdos/qdos.c:240:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char basedir[40];
data/unzip-6.0/qdos/qdos.c:491:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathcomp[FILNAMSIZ];      /* path-component buffer */
data/unzip-6.0/qdos/qdos.c:911:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&qextra, ef_ptr, sizeof(qdosextra));
data/unzip-6.0/tandem/tandem.c:252:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[FILENAME_MAX + 1];
data/unzip-6.0/tandem/tandem.c:254:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ext[EXTENSION_MAX + 1];
data/unzip-6.0/tandem/tandem.c:327:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[FILENAME_MAX + 1];
data/unzip-6.0/tandem/tandem.c:328:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ext[EXTENSION_MAX + 1];
data/unzip-6.0/tandem/tandem.c:388:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[FILENAME_MAX + 1];
data/unzip-6.0/tandem/tandem.c:389:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ext[EXTENSION_MAX + 1];
data/unzip-6.0/tandem/tandem.c:519:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[FILENAME_MAX + 1];
data/unzip-6.0/tandem/tandem.c:521:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ext[EXTENSION_MAX + 1];
data/unzip-6.0/tandem/tandem.c:776:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char sname[FILENAME_MAX + 1];
data/unzip-6.0/tandem/tandem.c:778:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fname[FILENAME_MAX + 1];
data/unzip-6.0/tandem/tandem.c:784:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ext[EXTENSION_MAX + 1];
data/unzip-6.0/tandem/tandem.h:79:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char   d_name[NAMELEN+1];
data/unzip-6.0/tandem/tandem.h:85:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char            D_path[NAMELEN+1];
data/unzip-6.0/tandem/tanunz.c:69:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char *dirname, matchname[FILNAMSIZ];
data/unzip-6.0/tandem/tanunz.c:241:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char nsk_work[FILENAME_MAX + 1], *nsk_fname=&nsk_work[0];
data/unzip-6.0/tandem/tanunz.c:326:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    G.outfile = fopen(G.filename, (G.pInfo->textmode ? FOPWT : FOPW));
data/unzip-6.0/tandem/tanunz.c:494:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathcomp[FILNAMSIZ];      /* path-component buffer */
data/unzip-6.0/tandem/tanunz.c:638:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fname[FILENAME_MAX + 1];
data/unzip-6.0/tandem/tanunz.c:640:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ext[EXTENSION_MAX + 1];
data/unzip-6.0/tandem/tanunz.c:895:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char nsk_work[FILENAME_MAX + 1], *nsk_fname=&nsk_work[0];
data/unzip-6.0/theos/_setargv.c:74:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char lib[256];
data/unzip-6.0/theos/_setargv.c:75:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char disk[3];
data/unzip-6.0/theos/_setargv.c:104:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lib[256];
data/unzip-6.0/theos/_stat.c:139:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256], buf2[256];
data/unzip-6.0/theos/_stat.c:162:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                strcpy(ifn = buf2, "/:S");
data/unzip-6.0/theos/theos.c:49:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fnbuf[1];              /* buffer stub for directory name */
data/unzip-6.0/theos/theos.c:168:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char *dirname, matchname[FILNAMSIZ];
data/unzip-6.0/theos/theos.c:488:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathcomp[FILNAMSIZ];      /* path-component buffer */
data/unzip-6.0/theos/theos.c:619:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(pathcomp+strlen(pathcomp), ",%03x", (int)(ft>>8) & 0xFFF);
data/unzip-6.0/theos/theos.c:681:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char rootdisk[3];  /* user's "extract-to" disk */
data/unzip-6.0/theos/theos.c:1197:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf1[40];
data/unzip-6.0/theos/thscfg.h:31:5:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int open(const char *name, int mode, ...);
data/unzip-6.0/timezone.c:46:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *tzname[2];
data/unzip-6.0/timezone.h:44:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   types[TZ_MAX_TIMES];
data/unzip-6.0/timezone.h:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            chars[TZ_MAX_CHARS];
data/unzip-6.0/tops20/tops20.c:96:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char temp[100];
data/unzip-6.0/tops20/tops20.c:151:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(temp, "%02d/%02d/%02d %02d:%02d:%02d", mo, dy, yr, hh, mm, ss);
data/unzip-6.0/tops20/tops20.c:195:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[40];
data/unzip-6.0/tops20/tops20.c:204:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      "cc ", (sprintf(buf, " version %d", _RELEASE), buf),
data/unzip-6.0/tops20/tops20.c:261:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char d[100];
data/unzip-6.0/tops20/tops20.c:291:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char d[100];
data/unzip-6.0/ttyio.c:265:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            kbbuf[16];  /* input buffer with - some - excess length */
data/unzip-6.0/ttyio.c:412:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (envptr == (char *)NULL || (n = atoi(envptr)) < 5) {
data/unzip-6.0/ttyio.c:422:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (envptr == (char *)NULL || (n = atoi(envptr)) < 5) {
data/unzip-6.0/ttyio.c:619:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((f = open(_PATH_TTY, 0)) == -1)
data/unzip-6.0/ttyio.c:669:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((f = fopen(ctermid(NULL), "r")) == NULL)
data/unzip-6.0/unix/unix.c:85:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fnbuf[1];              /* buffer stub for directory name */
data/unzip-6.0/unix/unix.c:130:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define opendir(path) fopen(path,"r")
data/unzip-6.0/unix/unix.c:147:32:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if ((dirp->dirhandle = fopen(dirspec, "r")) == NULL) {
data/unzip-6.0/unix/unix.c:512:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathcomp[FILNAMSIZ];      /* path-component buffer */
data/unzip-6.0/unix/unix.c:688:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(pathcomp, "__");
data/unzip-6.0/unix/unix.c:706:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(pathcomp+strlen(pathcomp), ",%03x", (int)(ft>>8) & 0xFFF);
data/unzip-6.0/unix/unix.c:1026:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char command[FILNAMSIZ+40]; /* buffer for system() call */
data/unzip-6.0/unix/unix.c:1159:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(slnk_entry->buf, &(G.pInfo->file_attr),
data/unzip-6.0/unix/unix.c:1162:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(slnk_entry->buf + 4, z_uidgid, sizeof(z_uidgid));
data/unzip-6.0/unix/unix.c:1220:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                Info(slide, 0x201, ((char *)slide, CannotSetItemUidGid,
data/unzip-6.0/unix/unix.c:1224:38:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                Info(slide, 0x201, ((char *)slide, CannotSetUidGid,
data/unzip-6.0/unix/unix.c:1294:34:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            Info(slide, 0x201, ((char *)slide, CannotSetItemUidGid,
data/unzip-6.0/unix/unix.c:1423:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cc_namebuf[40];
data/unzip-6.0/unix/unix.c:1424:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cc_versbuf[40];
data/unzip-6.0/unix/unix.c:1427:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cc_versbuf[17];
data/unzip-6.0/unix/unix.c:1430:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cc_versbuf[25];
data/unzip-6.0/unix/unix.c:1433:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cc_versbuf[17];
data/unzip-6.0/unix/unix.c:1437:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cc_versbuf[40];
data/unzip-6.0/unix/unix.c:1445:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char os_namebuf[40];
data/unzip-6.0/unix/unix.c:1448:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char os_namebuf[40];
data/unzip-6.0/unix/unix.c:1457:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(cc_namebuf, "NeXT DevKit %d.%02d ",
data/unzip-6.0/unix/unix.c:1467:18:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      "Sun C ", (sprintf(cc_versbuf, "version %x", __SUNPRO_C), cc_versbuf),
data/unzip-6.0/unix/unix.c:1472:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(cc_versbuf, "version A.%02d.%02d",
data/unzip-6.0/unix/unix.c:1474:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(cc_versbuf, "version A.%02d.%02d.%02d",
data/unzip-6.0/unix/unix.c:1480:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(cc_versbuf, "%c%d.%d-%03d",
data/unzip-6.0/unix/unix.c:1488:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      "cc ", (sprintf(cc_versbuf, "version %d", _RELEASE), cc_versbuf),
data/unzip-6.0/unix/unix.c:1492:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(cc_versbuf, "version %d.%d.%d",
data/unzip-6.0/unix/unix.c:1555:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(os_namebuf, " (Cray UNICOS release %d)", _UNICOS), os_namebuf),
data/unzip-6.0/unix/unix.c:1588:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(os_namebuf, " (NetBSD 0.8%c)", (char)(NetBSD0_8 - 1 + 'A')),
data/unzip-6.0/unix/unix.c:1592:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(os_namebuf, " (NetBSD 0.9%c)", (char)(NetBSD0_9 - 1 + 'A')),
data/unzip-6.0/unix/unix.c:1596:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(os_namebuf, " (NetBSD 1.0%c)", (char)(NetBSD1_0 - 1 + 'A')),
data/unzip-6.0/unix/unix.c:1733:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char            d_name[36] __attribute__ ((packed));/* name area */
data/unzip-6.0/unix/unix.c:1745:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        eb_header[4] __attribute__ ((packed));  /* place_holder */
data/unzip-6.0/unix/unix.c:1746:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        longid[8] __attribute__ ((packed));
data/unzip-6.0/unix/unix.c:1751:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        eb_header[4];                           /* place_holder */
data/unzip-6.0/unix/unix.c:1752:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        longid[4];
data/unzip-6.0/unix/unxcfg.h:221:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *dirname, matchname[FILNAMSIZ];\
data/unzip-6.0/unzip.h:590:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char betalevel[10];       /* e.g. "g BETA" or "" */
data/unzip-6.0/unzip.h:591:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char date[20];            /* e.g. "9 Oct 08" (beta) or "9 October 2008" */
data/unzip-6.0/unzip.h:592:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zlib_version[10];    /* e.g. "1.2.3" or NULL */
data/unzip-6.0/unzpriv.h:537:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   extern int open(), close(), read();
data/unzip-6.0/unzpriv.h:1288:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#  define memcpy(dest,src,len)   bcopy(src,dest,len)
data/unzip-6.0/unzpriv.h:1288:34:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#  define memcpy(dest,src,len)   bcopy(src,dest,len)
data/unzip-6.0/unzpriv.h:1366:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#   define zfopen fopen
data/unzip-6.0/unzpriv.h:1422:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#     define zfopen fopen
data/unzip-6.0/unzpriv.h:1445:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#     define zfopen fopen
data/unzip-6.0/unzpriv.h:1469:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#     define zfopen fopen
data/unzip-6.0/unzpriv.h:1498:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
# define zfopen fopen
data/unzip-6.0/unzpriv.h:1997:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       char buf[1];             /* start of system-specific internal data */
data/unzip-6.0/unzpriv.h:2008:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       char buf[1];             /* data/name/link buffer */
data/unzip-6.0/unzpriv.h:2357:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   zvoid *memcpy OF((register zvoid *, register ZCONST zvoid *,
data/unzip-6.0/unzpriv.h:3035:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   extern ZCONST char *fnames[2];
data/unzip-6.0/vms/cmdline.c:307:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char options[256];
data/unzip-6.0/vms/cmdline.c:363:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(the_cmd_line, "unzip");
data/unzip-6.0/vms/cmdline.c:755:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(&the_cmd_line[x], "-P");
data/unzip-6.0/vms/cmdline.c:784:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(&the_cmd_line[x], "-d");
data/unzip-6.0/vms/cmdline.c:807:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(&the_cmd_line[x], "-x");
data/unzip-6.0/vms/vms.c:140:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1];                        /* data buffer (extra_field, fn) */
data/unzip-6.0/vms/vms.c:236:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char hex_digit[16] = {
data/unzip-6.0/vms/vms.c:288:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char char_prop[256] = {
data/unzip-6.0/vms/vms.c:607:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char timbuf[24];         /* length = first entry in "date_str" + 1 */
data/unzip-6.0/vms/vms.c:856:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[NAM_MAXRSS + 128]; /* Name length + message length. */
data/unzip-6.0/vms/vms.c:1023:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[NAM_MAXRSS + 128]; /* Name length + message length. */
data/unzip-6.0/vms/vms.c:1041:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[NAM_MAXRSS + 128];    /* Name length + msg length. */
data/unzip-6.0/vms/vms.c:1153:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char exp_nam[NAM_MAXRSS];
data/unzip-6.0/vms/vms.c:1154:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char res_nam[NAM_MAXRSS];
data/unzip-6.0/vms/vms.c:1158:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char sys_nam[NAML$C_MAXRSS];     /* Probably need less here. */
data/unzip-6.0/vms/vms.c:1420:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[NAM_MAXRSS + 128]; /* Name length + message length. */
data/unzip-6.0/vms/vms.c:1534:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char answ[10];
data/unzip-6.0/vms/vms.c:1718:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char verbuf[80];
data/unzip-6.0/vms/vms.c:1941:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(curbuf->buf + curbuf->bufcnt, rawbuf + off, ncpy);
data/unzip-6.0/vms/vms.c:2028:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(curbuf->buf + curbuf->bufcnt, rawbuf + off, ncpy);
data/unzip-6.0/vms/vms.c:2112:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(locptr, out_ptr, ncpy);
data/unzip-6.0/vms/vms.c:2164:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(locptr, out_ptr, size);
data/unzip-6.0/vms/vms.c:2201:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[80];
data/unzip-6.0/vms/vms.c:2206:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(locbuf+loccnt, inptr, size);
data/unzip-6.0/vms/vms.c:2212:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(locbuf+loccnt, inptr, nneed);
data/unzip-6.0/vms/vms.c:2246:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(locbuf, inptr, size);
data/unzip-6.0/vms/vms.c:2257:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[80];
data/unzip-6.0/vms/vms.c:2407:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[80];           /* CANNOT use slide for Info() */
data/unzip-6.0/vms/vms.c:2431:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(locptr, rawbuf, eol_off);
data/unzip-6.0/vms/vms.c:2493:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[80];               /* CANNOT use slide for Info() */
data/unzip-6.0/vms/vms.c:2503:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(locptr, rawbuf + start, rest);
data/unzip-6.0/vms/vms.c:3073:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(d_entry->buf, G.extra_field, xlen);
data/unzip-6.0/vms/vms.c:3104:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dir_name[NAM_MAXRSS + 1];
data/unzip-6.0/vms/vms.c:3105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char warnmsg[NAM_MAXRSS + 128]; /* Name length + message length. */
data/unzip-6.0/vms/vms.c:3707:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(Rdate, Cdate, sizeof(Cdate));
data/unzip-6.0/vms/vms.c:3761:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[132];
data/unzip-6.0/vms/vms.c:3828:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char vms_msgbuf[256];            /* VMS-specific error message. */
data/unzip-6.0/vms/vms.c:3893:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char filenam[NAM_MAXRSS + 1];
data/unzip-6.0/vms/vms.c:3894:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char efn[NAM_MAXRSS];
data/unzip-6.0/vms/vms.c:3895:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char last_wild[NAM_MAXRSS + 1];
data/unzip-6.0/vms/vms.c:4182:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char e_name[NAM_MAXRSS + 1];
data/unzip-6.0/vms/vms.c:4506:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathcomp[FILNAMSIZ];       /* Path-component buffer. */
data/unzip-6.0/vms/vms.c:4674:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char pathbuf[FILNAMSIZ];
data/unzip-6.0/vms/vms.c:4677:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char lastdir[FILNAMSIZ] = "\t";
data/unzip-6.0/vms/vms.c:5444:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[40];
data/unzip-6.0/vms/vms.c:5445:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char vms_vers[16];
data/unzip-6.0/vms/vms.c:5449:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf2[40];
data/unzip-6.0/vms/vms.c:5480:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(buf2, " %c%d.%d-%03d",
data/unzip-6.0/vms/vmsdefs.h:149:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fat$fill[8];
data/unzip-6.0/win32/nt.c:262:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char TempRootPath[MAX_PATH + 1];
data/unzip-6.0/win32/nt.c:404:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(VolumeCaps, &g_VolumeCaps, sizeof(VOLUMECAPS));
data/unzip-6.0/win32/nt.h:26:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char RootPath[MAX_PATH+1];  /* path to network / filesystem */
data/unzip-6.0/win32/w32cfg.h:302:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lastRootPath[4];\
data/unzip-6.0/win32/w32cfg.h:306:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *dirname, matchname[FILNAMSIZ];\
data/unzip-6.0/win32/win32.c:95:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char    reserved [21];
data/unzip-6.0/win32/win32.c:100:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char    d_name[MAX_PATH];
data/unzip-6.0/win32/win32.c:123:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1];                /* buffer stub for directory SD and name */
data/unzip-6.0/win32/win32.c:243:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(p+len, "/*");
data/unzip-6.0/win32/win32.c:1208:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(d_entry->buf, ebSDptr, ebSDlen);
data/unzip-6.0/win32/win32.c:1381:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char rootPathName[4];
data/unzip-6.0/win32/win32.c:1412:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp1[MAX_PATH], tmp2[MAX_PATH];
data/unzip-6.0/win32/win32.c:1663:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pathcomp[FILNAMSIZ];   /* path-component buffer */
data/unzip-6.0/win32/win32.c:1787:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(pp, cp, CLEN(cp));
data/unzip-6.0/win32/win32.c:1885:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(pathcomp+strlen(pathcomp), ",%03x", (int)(ft>>8) & 0xFFF);
data/unzip-6.0/win32/win32.c:1901:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char drive[4];
data/unzip-6.0/win32/win32.c:1912:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(drive + 1, ":\\");
data/unzip-6.0/win32/win32.c:2356:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char tmpN[MAX_PATH], *tmpP;
data/unzip-6.0/win32/win32.c:2497:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char df[2];   /* LOCALE_IDATE has a maximum value of 2 */
data/unzip-6.0/win32/win32.c:2520:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char df[2];   /* use only if it is one character */
data/unzip-6.0/win32/win32.c:2541:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[80];
data/unzip-6.0/win32/win32.c:2543:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf2[80];
data/unzip-6.0/win32/win32.c:2550:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(buf, "Microsoft C %d.%02d ", _MSC_VER/100, _MSC_VER%100), buf),
data/unzip-6.0/win32/win32.c:2558:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(buf2, "(Visual C++ %d.%d)", _MSC_VER/100 - 6, _MSC_VER%100/10),
data/unzip-6.0/win32/win32.c:2565:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(buf, "Watcom C/C++ %d.%02d", __WATCOMC__ / 100,
data/unzip-6.0/win32/win32.c:2568:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(buf, "Watcom C/C++ %d.%d", __WATCOMC__ / 100,
data/unzip-6.0/win32/win32.c:2607:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(buf, "rsxnt(djgpp v%d.%02d) / gcc ",
data/unzip-6.0/win32/win32.c:2610:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      (sprintf(buf, "rsxnt(emx+djgpp v%d.%02d) / gcc ",
data/unzip-6.0/win32/win32.c:2913:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buf[2];
data/unzip-6.0/win32/win32.c:2959:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[9];
data/unzip-6.0/win32/win32.c:3042:13:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    ulenw = MultiByteToWideChar(
data/unzip-6.0/win32/win32.c:3060:12:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    ulen = MultiByteToWideChar(
data/unzip-6.0/win32/win32.c:3087:13:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    ulenw = MultiByteToWideChar(
data/unzip-6.0/win32/win32.c:3105:12:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    ulen = MultiByteToWideChar(
data/unzip-6.0/win32/win32i64.c:116:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fTemp = fopen(filename, mode);
data/unzip-6.0/wince/intrface.cpp:657:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szBuffer[_MAX_PATH];
data/unzip-6.0/wince/intrface.cpp:1009:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(p2, p1, CLEN(p1));
data/unzip-6.0/wince/intrface.cpp:1214:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char szRoot[10];
data/unzip-6.0/wince/intrface.cpp:1230:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char szRoot[_MAX_PATH] = "\0\0\0", szFS[64];
data/unzip-6.0/wince/intrface.cpp:1320:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szFile[_MAX_PATH];
data/unzip-6.0/wince/intrface.cpp:1606:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(pOut, pIn, CLEN(pIn));
data/unzip-6.0/wince/intrface.cpp:1654:13:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            TCHAR szFile[_MAX_PATH];
data/unzip-6.0/wince/intrface.cpp:1729:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(G.rootpath, pathcompStart, G.rootlen);
data/unzip-6.0/wince/intrface.cpp:1810:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[9];
data/unzip-6.0/wince/wcecfg.h:211:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char  matchname[FILNAMSIZ];   \
data/unzip-6.0/wince/wcecfg.h:220:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char rootpath[_MAX_PATH];\
data/unzip-6.0/wince/wince.cpp:84:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szBuffer[512] = TEXT("PUNZIP: ");
data/unzip-6.0/wince/wince.cpp:133:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szPath[_MAX_PATH];
data/unzip-6.0/wince/wince.cpp:161:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int __cdecl open(const char *filename, int oflags, ...) {
data/unzip-6.0/wince/wince.cpp:192:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szPath[_MAX_PATH];
data/unzip-6.0/wince/wince.cpp:225:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szPath[_MAX_PATH];
data/unzip-6.0/wince/wince.cpp:259:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
FILE * __cdecl fopen(const char *filename, const char *mode) {
data/unzip-6.0/wince/wince.cpp:289:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szPath[_MAX_PATH];
data/unzip-6.0/wince/wince.cpp:481:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szPath[_MAX_PATH];
data/unzip-6.0/wince/wince.h:189:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ZCRTIMP int __cdecl open(const char *, int, ...);
data/unzip-6.0/wince/wince.h:216:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ZCRTIMP FILE * __cdecl fopen(const char *, const char *);
data/unzip-6.0/wince/winmain.cpp:160:8:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static TCHAR           g_szTempDirPath[_MAX_PATH];
data/unzip-6.0/wince/winmain.cpp:358:7:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      TCHAR szBuffer[_MAX_PATH];
data/unzip-6.0/wince/winmain.cpp:521:7:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      TCHAR szPath[_MAX_PATH];
data/unzip-6.0/wince/winmain.cpp:537:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szPath[32] = TEXT("punzip.exe");
data/unzip-6.0/wince/winmain.cpp:538:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szTstPath[32];
data/unzip-6.0/wince/winmain.cpp:544:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szLongPath[_MAX_PATH];
data/unzip-6.0/wince/winmain.cpp:545:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szPath[_MAX_PATH];
data/unzip-6.0/wince/winmain.cpp:546:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szTstPath[_MAX_PATH];
data/unzip-6.0/wince/winmain.cpp:624:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szExtension[128], szKey[128], szDescription[_MAX_PATH], szIconFile[_MAX_PATH + 16];
data/unzip-6.0/wince/winmain.cpp:1070:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szPath[_MAX_PATH] = TEXT("");
data/unzip-6.0/wince/winmain.cpp:1117:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szPath[_MAX_PATH + 256];
data/unzip-6.0/wince/winmain.cpp:1225:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szApp[_MAX_PATH];
data/unzip-6.0/wince/winmain.cpp:1423:7:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      TCHAR szColumn[32];
data/unzip-6.0/wince/winmain.cpp:1455:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szBuffer1[8], szBuffer2[8];
data/unzip-6.0/wince/winmain.cpp:1543:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szCaption[_MAX_PATH + 32];
data/unzip-6.0/wince/winmain.cpp:1605:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szPath[_MAX_PATH + 16];
data/unzip-6.0/wince/winmain.cpp:1645:7:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      TCHAR szColumn[32];
data/unzip-6.0/wince/winmain.cpp:1879:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szOut[256], *pszOut = szOut;
data/unzip-6.0/wince/winmain.cpp:2000:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(szType, " File");
data/unzip-6.0/wince/winmain.cpp:2272:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szMRU[MRU_MAX_FILE][_MAX_PATH + 4], szOption[8];
data/unzip-6.0/wince/winmain.cpp:2310:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szMRU[MRU_MAX_FILE + 1][_MAX_PATH + 4], szOption[8];
data/unzip-6.0/wince/winmain.cpp:2393:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szMRU[MRU_MAX_FILE][_MAX_PATH + 4], szOption[8];
data/unzip-6.0/wince/winmain.cpp:2501:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szFile[_MAX_PATH + 4];
data/unzip-6.0/wince/winmain.cpp:2592:7:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      TCHAR szError[_MAX_PATH + 128];
data/unzip-6.0/wince/winmain.cpp:2646:10:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         TCHAR  szBuffer[MAX_PATH];
data/unzip-6.0/wince/winmain.cpp:2923:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR  szPath[_MAX_PATH];
data/unzip-6.0/wince/winmain.cpp:3034:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szInitialDir[_MAX_PATH];
data/unzip-6.0/wince/winmain.cpp:3219:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szBuffer[32];
data/unzip-6.0/wince/winmain.cpp:3441:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szBuffer[_MAX_PATH + 32];
data/unzip-6.0/wince/winmain.cpp:3510:7:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      TCHAR szMessage[_MAX_PATH + 128];
data/unzip-6.0/wince/winmain.cpp:3541:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szMessage[_MAX_PATH + 32];
data/unzip-6.0/wince/winmain.cpp:3603:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szMessage[_MAX_PATH + 32];
data/unzip-6.0/wince/winmain.cpp:3730:16:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               TCHAR szInitialDir[_MAX_PATH], *szFile;
data/unzip-6.0/wince/winmain.cpp:3851:10:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         TCHAR szBuffer[128];
data/unzip-6.0/windll/guisfx/sfxwiz.c:87:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char szAppName[_MAX_PATH];
data/unzip-6.0/windll/guisfx/sfxwiz.c:88:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char szTarget[_MAX_PATH];
data/unzip-6.0/windll/guisfx/sfxwiz.c:89:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char szThisApp[_MAX_PATH];
data/unzip-6.0/windll/guisfx/sfxwiz.c:100:1:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
TCHAR   zfn[MAX_PATH],                      // zip filename and path
data/unzip-6.0/windll/guisfx/sfxwiz.c:120:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR szTemp[MAX_PATH];
data/unzip-6.0/windll/guisfx/sfxwiz.c:253:4:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   TCHAR szMessage[256];
data/unzip-6.0/windll/guisfx/sfxwiz.c:288:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char szTemp[MAX_PATH]="mike_~@~*";
data/unzip-6.0/windll/guisfx/sfxwiz.c:455:1:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
TCHAR sz[MAX_PATH];
data/unzip-6.0/windll/uzexampl.c:99:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char szFullPath[_MAX_PATH];
data/unzip-6.0/windll/uzexampl.c:175:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[256];
data/unzip-6.0/windll/uzexampl.c:196:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[256];
data/unzip-6.0/windll/uzexampl.c:235:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[256];
data/unzip-6.0/windll/uzexampl.c:258:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[256];
data/unzip-6.0/windll/uzexampl.c:289:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str[256];
data/unzip-6.0/windll/uzexampl.c:311:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[256];
data/unzip-6.0/windll/uzexampl.c:441:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char psLBEntry[_MAX_PATH];
data/unzip-6.0/windll/uzexampl.c:446:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char szCompFactor[10];
data/unzip-6.0/windll/windll.c:180:5:  [2] (buffer) lstrcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant string.
    lstrcat(str1, " @");
data/unzip-6.0/zipinfo.c:355:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static ZCONST char Far *izVMScomp[4] =
data/unzip-6.0/zipinfo.c:400:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static ZCONST char Far *TandemFileformat[6] =
data/unzip-6.0/zipinfo.c:998:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char workspace[12], attribs[22];
data/unzip-6.0/zipinfo.c:1000:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char unkn[16];
data/unzip-6.0/zipinfo.c:1001:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static ZCONST char Far *os[NUM_HOSTS] = {
data/unzip-6.0/zipinfo.c:1008:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static ZCONST char Far *method[NUM_METHODS] = {
data/unzip-6.0/zipinfo.c:1013:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static ZCONST char Far *dtypelng[4] = {
data/unzip-6.0/zipinfo.c:1100:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        Info(slide, 0, ((char *)slide, LoadFarString(CompressSubtype),
data/unzip-6.0/zipinfo.c:1528:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char *p, q[8];
data/unzip-6.0/zipinfo.c:1566:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        Info(slide, 0, ((char *)slide,
data/unzip-6.0/zipinfo.c:1576:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char types[80];
data/unzip-6.0/zipinfo.c:1615:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                            Info(slide, 0, ((char *)slide,
data/unzip-6.0/zipinfo.c:1620:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                            Info(slide, 0, ((char *)slide,
data/unzip-6.0/zipinfo.c:1626:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                            Info(slide, 0, ((char *)slide,
data/unzip-6.0/zipinfo.c:1693:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        Info(slide, 0, ((char *)slide,
data/unzip-6.0/zipinfo.c:1704:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char filenameBuf[32];
data/unzip-6.0/zipinfo.c:1706:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(filenameBuf, &ef_ptr[33], 31);
data/unzip-6.0/zipinfo.c:1719:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char type[100];
data/unzip-6.0/zipinfo.c:1755:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        Info(slide, 0, ((char *)slide, LoadFarString(QDOSdata),
data/unzip-6.0/zipinfo.c:1763:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        Info(slide, 0, ((char *)slide, LoadFarString(AOSVSdata),
data/unzip-6.0/zipinfo.c:1783:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        Info(slide, 0, ((char *)slide,
data/unzip-6.0/zipinfo.c:1793:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char md5[33];
data/unzip-6.0/zipinfo.c:1797:29:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                            sprintf(&md5[i<<1], "%02x", ef_ptr[15-i]);
data/unzip-6.0/zipinfo.c:1818:46:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                            Info(slide, 0, ((char *)slide,
data/unzip-6.0/zipinfo.c:1884:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        *p, workspace[12], attribs[16];
data/unzip-6.0/zipinfo.c:1885:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        methbuf[5];
data/unzip-6.0/zipinfo.c:1886:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static ZCONST char dtype[5]="NXFS"; /* normal, maximum, fast, superfast */
data/unzip-6.0/zipinfo.c:1887:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static ZCONST char Far os[NUM_HOSTS+1][4] = {
data/unzip-6.0/zipinfo.c:1896:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static ZCONST char Far method[NUM_METHODS+1][5] = {
data/unzip-6.0/zipinfo.c:1932:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf( &methbuf[ 1], "%03u", G.crec.compression_method);
data/unzip-6.0/zipinfo.c:1934:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf( &methbuf[ 0], "%04X", G.crec.compression_method);
data/unzip-6.0/zipinfo.c:1983:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf(&attribs[12], "%u.%u", hostver/10, hostver%10);
data/unzip-6.0/zipinfo.c:2001:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(&attribs[12], "%u.%u", hostver/10, hostver%10);
data/unzip-6.0/zipinfo.c:2026:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(&attribs[12], "%u.%u", hostver/10, hostver%10);
data/unzip-6.0/zipinfo.c:2053:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(&attribs[12], "%u.%u", hostver/10, hostver%10);
data/unzip-6.0/zipinfo.c:2072:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(attribs, ".r.-...     %u.%u", hostver/10, hostver%10);
data/unzip-6.0/zipinfo.c:2128:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(&attribs[11], "%2u.%u", hostver/10, hostver%10);
data/unzip-6.0/zipinfo.c:2219:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       Info(slide, 0, ((char *)slide, LoadFarString(MacOSdata),
data/unzip-6.0/zipinfo.c:2225:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       Info(slide, 0, ((char *)slide, LoadFarString(MacOSdata1),
data/unzip-6.0/zipinfo.c:2252:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char monthbuf[4];
data/unzip-6.0/zipinfo.c:2254:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static ZCONST char Far month[12][4] = {
data/unzip-6.0/acorn/acorn.c:92:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/acorn/acorn.c:96:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(dirname, wildspec, dirnamelen);
data/unzip-6.0/acorn/acorn.c:121:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/acorn/acorn.c:167:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int i = strlen(name) - 4;
data/unzip-6.0/acorn/acorn.c:277:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                extent fnlen = strlen(G.filename);
data/unzip-6.0/acorn/acorn.c:297:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int ftype=strtol(G.filename+strlen(G.filename)-3,NULL,16)&0xFFF;
data/unzip-6.0/acorn/acorn.c:459:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (G.filename[strlen(G.filename) - 1] == '/') {
data/unzip-6.0/acorn/acorn.c:501:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      pathcomp[strlen(pathcomp)-4]=0;
data/unzip-6.0/acorn/acorn.c:672:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((buildpath = (char *)malloc(strlen(G.filename)+rootlen+1))
data/unzip-6.0/acorn/acorn.c:703:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((rootlen = strlen(pathcomp)) > 0) {
data/unzip-6.0/acorn/acorn.c:990:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (*G.message)((zvoid *)&G, slide, (ulg)strlen((char *)slide), 0);
data/unzip-6.0/acorn/riscos.c:102:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 thisdir->dirname=(char *)malloc(strlen(dirname)+1);
data/unzip-6.0/acorn/riscos.c:109:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 if (thisdir->dirname[strlen(thisdir->dirname)-1]=='.')
data/unzip-6.0/acorn/riscos.c:110:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   thisdir->dirname[strlen(thisdir->dirname)-1]=0;
data/unzip-6.0/acorn/riscos.c:144:44:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if (SWI_OS_GBPB_9(d->dirname,d->buf,&d->read,&d->offset,DIR_BUFSIZE,NULL)!=NULL)
data/unzip-6.0/acorn/riscos.c:156:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   d->act=(char *)(d->act+strlen(d->act)+1);
data/unzip-6.0/acorn/riscos.c:160:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 dent.d_namlen=strlen(dent.d_name);
data/unzip-6.0/acorn/riscos.c:164:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
 if (!d->read)
data/unzip-6.0/acorn/riscos.c:165:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   SWI_OS_GBPB_9(d->dirname,d->buf,&d->read,&d->offset,0,NULL);
data/unzip-6.0/acorn/riscos.c:203:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 len = strlen(d);
data/unzip-6.0/acorn/riscos.c:253:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
 exts2swap=malloc(1+strlen(envptr));
data/unzip-6.0/acorn/riscos.h:50:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int read;
data/unzip-6.0/amiga/amiga.c:121:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(G.matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/amiga/amiga.c:138:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(G.matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/amiga/amiga.c:142:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(G.dirname, wildspec, G.dirnamelen);
data/unzip-6.0/amiga/amiga.c:161:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(G.matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/amiga/amiga.c:424:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (G.filename[strlen(G.filename) - 1] == '/') {
data/unzip-6.0/amiga/amiga.c:606:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((G.buildpath = (char *)malloc(strlen(G.filename)+G.rootlen+1))
data/unzip-6.0/amiga/amiga.c:637:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((G.rootlen = strlen(pathcomp)) > 0) {
data/unzip-6.0/amiga/amiga.c:875:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(devname, debna, i);
data/unzip-6.0/amiga/filedate.c:301:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        *ptr = strlen(fib->fib_FileName);
data/unzip-6.0/amiga/filedate.c:365:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        long len = value ? strlen(value) : 0;
data/unzip-6.0/amiga/filedate.c:397:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            sprintf(put_tz + strlen(put_tz), ":%02d", offset / 60);
data/unzip-6.0/amiga/filedate.c:399:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                sprintf(put_tz + strlen(put_tz), ":%02d", offset % 60);
data/unzip-6.0/amiga/stat.c:210:5:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
int umask(void)  { return 0; }
data/unzip-6.0/amiga/stat.c:243:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(_arg_lin, cp + 1, c);
data/unzip-6.0/amiga/stat.c:283:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cp += strlen(cp) + 1;
data/unzip-6.0/amiga/z-stat.h:88:5:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
int umask(void);
data/unzip-6.0/aosvs/aosvs.c:135:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/aosvs/aosvs.c:154:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/aosvs/aosvs.c:158:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(dirname, wildspec, dirnamelen);
data/unzip-6.0/aosvs/aosvs.c:188:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/aosvs/aosvs.c:488:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                extent fnlen = strlen(G.filename);
data/unzip-6.0/aosvs/aosvs.c:504:5:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    umask( (int)(tmp=umask(0)) );    /* apply mask to expanded r/w(/x) perms */
data/unzip-6.0/aosvs/aosvs.c:504:22:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    umask( (int)(tmp=umask(0)) );    /* apply mask to expanded r/w(/x) perms */
data/unzip-6.0/aosvs/aosvs.c:639:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (G.filename[strlen(G.filename) - 1] == '/') {
data/unzip-6.0/aosvs/aosvs.c:689:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sprintf(pathcomp+strlen(pathcomp), ",%03x", (int)(ft>>8) & 0xFFF);
data/unzip-6.0/aosvs/aosvs.c:894:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((buildpath = (char *)malloc(strlen(G.filename)+rootlen+1))
data/unzip-6.0/aosvs/aosvs.c:925:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((rootlen = strlen(pathcomp)) > 0) {
data/unzip-6.0/aosvs/aosvs.c:1020:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                ucsize + strlen(G.filename);
data/unzip-6.0/aosvs/aosvs.c:1149:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      (strlen(__VERSION__) > 8)? "(gcc)" :
data/unzip-6.0/aosvs/aosvs.c:1333:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (*G.message)((zvoid *)&G, slide, (ulg)strlen((char *)slide), 0);
data/unzip-6.0/api.c:137:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(version->zlib_version, ZLIB_VERSION,
data/unzip-6.0/api.c:280:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    intern_zip = (char *)malloc(strlen(zip)+1);
data/unzip-6.0/api.c:285:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    intern_file = (char *)malloc(strlen(file)+1);
data/unzip-6.0/api.c:391:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((zip == NULL) || (strlen(zip) > ((WSIZE>>2) - 160)))
data/unzip-6.0/api.c:393:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((file == NULL) || (strlen(file) > ((WSIZE>>2) - 160)))
data/unzip-6.0/api.c:581:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    patternLen = strlen(pattern);
data/unzip-6.0/api.c:590:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(sz, " ");
data/unzip-6.0/api.c:592:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(sz, " ");
data/unzip-6.0/api.c:597:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        for (i = 0; i < strlen(sz); i++)
data/unzip-6.0/api.c:656:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(archive) >= FILNAMSIZ) {
data/unzip-6.0/apihelp.c:103:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    while (doc->compare && STRNICMP(doc->compare,slide,strlen(fname)))
data/unzip-6.0/atari/atari.c:67:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/atari/atari.c:86:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/atari/atari.c:90:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(dirname, wildspec, dirnamelen);
data/unzip-6.0/atari/atari.c:120:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/atari/atari.c:281:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                extent fnlen = strlen(G.filename);
data/unzip-6.0/atari/atari.c:305:5:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    umask( (int)(tmp=umask(0)) );    /* apply mask to expanded r/w(/x) perms */
data/unzip-6.0/atari/atari.c:305:22:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    umask( (int)(tmp=umask(0)) );    /* apply mask to expanded r/w(/x) perms */
data/unzip-6.0/atari/atari.c:440:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (G.filename[strlen(G.filename) - 1] == '/') {
data/unzip-6.0/atari/atari.c:490:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sprintf(pathcomp+strlen(pathcomp), ",%03x", (int)(ft>>8) & 0xFFF);
data/unzip-6.0/atari/atari.c:692:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((buildpath = (char *)malloc(strlen(G.filename)+rootlen+
data/unzip-6.0/atari/atari.c:695:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((buildpath = (char *)malloc(strlen(G.filename)+rootlen+1))
data/unzip-6.0/atari/atari.c:726:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((rootlen = strlen(pathcomp)) > 0) {
data/unzip-6.0/atari/atari.c:829:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                ucsize + strlen(G.filename);
data/unzip-6.0/atari/atari.c:1015:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (*G.message)((zvoid *)&G, slide, (ulg)strlen((char *)slide), 0);
data/unzip-6.0/atheos/atheos.c:105:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(G.matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/atheos/atheos.c:124:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(G.matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/atheos/atheos.c:128:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(G.dirname, wildspec, G.dirnamelen);
data/unzip-6.0/atheos/atheos.c:161:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(G.matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/atheos/atheos.c:355:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                extent fnlen = strlen(G.filename);
data/unzip-6.0/atheos/atheos.c:379:5:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    umask( (int)(tmp=umask(0)) );    /* apply mask to expanded r/w(/x) perms */
data/unzip-6.0/atheos/atheos.c:379:22:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    umask( (int)(tmp=umask(0)) );    /* apply mask to expanded r/w(/x) perms */
data/unzip-6.0/atheos/atheos.c:508:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (G.filename[strlen(G.filename) - 1] == '/') {
data/unzip-6.0/atheos/atheos.c:581:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sprintf(pathcomp+strlen(pathcomp), ",%03x", (int)(ft>>8) & 0xFFF);
data/unzip-6.0/atheos/atheos.c:760:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((G.buildpath = (char *)malloc(strlen(G.filename)+G.rootlen+
data/unzip-6.0/atheos/atheos.c:763:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((G.buildpath = (char *)malloc(strlen(G.filename)+G.rootlen+1))
data/unzip-6.0/atheos/atheos.c:795:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((G.rootlen = strlen(pathcomp)) > 0) {
data/unzip-6.0/atheos/atheos.c:961:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         ucsize + strlen(G.filename);
data/unzip-6.0/atheos/atheos.c:1107:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d_entry = (uxdirattr *)malloc(sizeof(uxdirattr) + strlen(G.filename));
data/unzip-6.0/atheos/atheos.c:1218:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (*G.message)((zvoid *)&G, slide, (ulg)strlen((char *)slide), 0);
data/unzip-6.0/atheos/atheos.c:1293:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ptr       += strlen(attr_name) + 1;
data/unzip-6.0/beos/beos.c:136:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(G.matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/beos/beos.c:155:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(G.matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/beos/beos.c:159:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(G.dirname, wildspec, G.dirnamelen);
data/unzip-6.0/beos/beos.c:192:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(G.matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/beos/beos.c:386:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                extent fnlen = strlen(G.filename);
data/unzip-6.0/beos/beos.c:410:5:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    umask( (int)(tmp=umask(0)) );    /* apply mask to expanded r/w(/x) perms */
data/unzip-6.0/beos/beos.c:410:22:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    umask( (int)(tmp=umask(0)) );    /* apply mask to expanded r/w(/x) perms */
data/unzip-6.0/beos/beos.c:539:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (G.filename[strlen(G.filename) - 1] == '/') {
data/unzip-6.0/beos/beos.c:614:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sprintf(pathcomp+strlen(pathcomp), ",%03x", (int)(ft>>8) & 0xFFF);
data/unzip-6.0/beos/beos.c:796:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((G.buildpath = (char *)malloc(strlen(G.filename)+G.rootlen+
data/unzip-6.0/beos/beos.c:799:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((G.buildpath = (char *)malloc(strlen(G.filename)+G.rootlen+1))
data/unzip-6.0/beos/beos.c:831:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((G.rootlen = strlen(pathcomp)) > 0) {
data/unzip-6.0/beos/beos.c:1000:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         ucsize + strlen(G.filename);
data/unzip-6.0/beos/beos.c:1145:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d_entry = (uxdirattr *)malloc(sizeof(uxdirattr) + strlen(G.filename));
data/unzip-6.0/beos/beos.c:1264:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (*G.message)((zvoid *)&G, slide, (ulg)strlen((char *)slide), 0);
data/unzip-6.0/beos/beos.c:1339:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ptr       += strlen(attr_name) + 1;
data/unzip-6.0/cmsmvs/vmmvs.c:207:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(type, "w");
data/unzip-6.0/cmsmvs/vmmvs.c:217:28:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    if (fdata->__recfmBlk) strcat(type, "B");
data/unzip-6.0/cmsmvs/vmmvs.c:218:28:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    if (fdata->__recfmS)   strcat(type, "S");
data/unzip-6.0/cmsmvs/vmmvs.c:219:28:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    if (fdata->__recfmASA) strcat(type, "A");
data/unzip-6.0/cmsmvs/vmmvs.c:220:28:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    if (fdata->__recfmM)   strcat(type, "M");
data/unzip-6.0/cmsmvs/vmmvs.c:221:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sprintf(type+strlen(type), ",lrecl=%ld", fdata->__recfmV
data/unzip-6.0/cmsmvs/vmmvs.c:227:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       sprintf(type+strlen(type), ",blksize=%ld", fdata->__blksize);
data/unzip-6.0/cmsmvs/vmmvs.c:230:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sprintf(type+strlen(type), ",blksize=%ld", fdata->__blksize);
data/unzip-6.0/cmsmvs/vmmvs.c:233:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strlen(type);
data/unzip-6.0/cmsmvs/vmmvs.c:253:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
       strncpy(filename, wld, sizeof(filename));
data/unzip-6.0/cmsmvs/vmmvs.c:308:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       memmove(lbar, lbar+1, strlen(lbar));
data/unzip-6.0/cmsmvs/vmmvs.c:315:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       memmove(lbar, lbar+1, strlen(lbar));
data/unzip-6.0/cmsmvs/vmmvs.c:337:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(pmember, "(");
data/unzip-6.0/cmsmvs/vmmvs.c:339:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(pmember, ")");
data/unzip-6.0/cmsmvs/vmmvs.c:345:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        memmove(lbar, lbar+1, strlen(lbar));
data/unzip-6.0/cmsmvs/vmmvs.c:409:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        else if ((rootlen = strlen(pathcomp)) > 0) {
data/unzip-6.0/cmsmvs/vmmvs.c:429:12:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
           strcat(pathcomp, ".");       /* used as minidisk to be save on  */
data/unzip-6.0/cmsmvs/vmmvs.c:438:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              quoted = strlen(newfilename) - 1;
data/unzip-6.0/cmsmvs/vmmvs.c:450:18:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                 strcat(newfilename, ".");
data/unzip-6.0/cmsmvs/vmmvs.c:453:15:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
              strcat(newfilename, "(");
data/unzip-6.0/cmsmvs/vmmvs.c:455:15:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
              strcat(newfilename, ")");
data/unzip-6.0/cmsmvs/vmmvs.c:458:15:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
              strcat(newfilename, ".");
data/unzip-6.0/cmsmvs/vmmvs.c:462:15:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
              strcat(newfilename, "'");
data/unzip-6.0/crypt.c:304:18:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if ((c = getc(source)) == EOF) {
data/unzip-6.0/crypt.c:356:19:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if ((c1 = getc(source)) == EOF) {
data/unzip-6.0/crypt.c:394:19:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if ((c1 = getc(source)) == EOF) {
data/unzip-6.0/crypt.c:489:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if ((GLOBAL(key) = (char *)malloc(strlen(passwrd)+1)) ==
data/unzip-6.0/crypt.c:552:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((key_translated = malloc(strlen(GLOBAL(key)) + 1)) == (char *)NULL)
data/unzip-6.0/crypt.c:565:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((key_translated = malloc(strlen(GLOBAL(key)) + 1)) == (char *)NULL)
data/unzip-6.0/crypt.h:157:34:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   (encrypted? update_keys(__G__ getc(G.in)^decrypt_byte(__G)) : getc(G.in))
data/unzip-6.0/crypt.h:157:66:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   (encrypted? update_keys(__G__ getc(G.in)^decrypt_byte(__G)) : getc(G.in))
data/unzip-6.0/envargs.c:72:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bufptr = malloc(1 + strlen(envptr));
data/unzip-6.0/extract.c:773:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        read(G.zipfd, (char *)G.inbuf, INBUFSIZ);  /* been here before... */
data/unzip-6.0/extract.c:1130:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((G.pInfo->cfilname = zfmalloc(strlen(G.filename) + 1)) == NULL) {
data/unzip-6.0/extract.c:1276:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if ((G.incnt = read(G.zipfd, (char *)G.inbuf, INBUFSIZ)) <= 0)
data/unzip-6.0/extract.c:1623:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                int cndx = strlen(G.filename) - 1;
data/unzip-6.0/extract.c:1677:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            fnlen = strlen(G.filename);
data/unzip-6.0/extract.c:1710:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        fnlen = strlen(G.answerbuf);
data/unzip-6.0/fileio.c:310:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            blen = strlen(BackupSuffix);
data/unzip-6.0/fileio.c:311:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            flen = strlen(G.filename);
data/unzip-6.0/fileio.c:407:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((tfilnam = (char *)malloc(2*strlen(G.filename)+1)) == (char *)NULL)
data/unzip-6.0/fileio.c:457:28:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
        mode_t umask_sav = umask(0077);
data/unzip-6.0/fileio.c:468:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
        umask(umask_sav);
data/unzip-6.0/fileio.c:588:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if ((G.incnt = read(G.zipfd, (char *)G.inbuf, INBUFSIZ)) == 0)
data/unzip-6.0/fileio.c:594:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  (ulg)strlen(LoadFarString(ReadError)), 0x401);
data/unzip-6.0/fileio.c:631:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if ((G.incnt = read(G.zipfd, (char *)G.inbuf, INBUFSIZ)) == 0) {
data/unzip-6.0/fileio.c:637:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              (ulg)strlen(LoadFarString(ReadError)), 0x401);
data/unzip-6.0/fileio.c:684:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  (G.incnt = read(G.zipfd, (char *)G.inbuf, INBUFSIZ)) <= 0)
data/unzip-6.0/fileio.c:764:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if ((G.incnt = read(G.zipfd, (char *)G.inbuf, INBUFSIZ)) <= 0)
data/unzip-6.0/fileio.c:1601:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        zfnfl = strlen(zfnf);
data/unzip-6.0/fileio.c:1603:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (2*FILNAMSIZ >= zfnfl && (2*FILNAMSIZ - zfnfl) >= strlen(efnf))
data/unzip-6.0/fileio.c:2080:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    eol = G.autorun_command + strlen(G.autorun_command) - 1;
data/unzip-6.0/fileio.c:2239:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(G.filename, G.filename_full, length);
data/unzip-6.0/fileio.c:2331:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (G.unipath_filename && strlen(G.unipath_filename) == 0) {
data/unzip-6.0/fileio.c:2344:19:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                  strncpy(G.filename, G.unipath_filename, FILNAMSIZ - 1);
data/unzip-6.0/fileio.c:2346:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  if (strlen(G.unipath_filename) >= FILNAMSIZ) {
data/unzip-6.0/fileio.c:2365:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  if (strlen(fn) >= FILNAMSIZ) {
data/unzip-6.0/fileio.c:2412:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (!(G.filenotes[G.filenote_slot] = malloc(strlen(tmp_fnote)+1)))
data/unzip-6.0/fileio.c:2533:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(fmt, ".");
data/unzip-6.0/fileio.c:2544:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(fmt, "d");      /* Default radix = decimal. */
data/unzip-6.0/flexos/flexos.c:98:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/flexos/flexos.c:118:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/flexos/flexos.c:124:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(dirname, wildspec, dirnamelen);
data/unzip-6.0/flexos/flexos.c:141:21:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                    strcat(fnamestart, ".");
data/unzip-6.0/flexos/flexos.c:147:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    fnamestart += strlen(fnamestart) - 1;
data/unzip-6.0/flexos/flexos.c:166:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/flexos/flexos.c:193:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(fnamestart, ".");
data/unzip-6.0/flexos/flexos.c:197:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            fnamestart += strlen(fnamestart) - 1;
data/unzip-6.0/flexos/flexos.c:413:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (G.filename[strlen(G.filename) - 1] == '/') {
data/unzip-6.0/flexos/flexos.c:463:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *pEnd = pathcomp + strlen(pathcomp);
data/unzip-6.0/flexos/flexos.c:648:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((buildpath = (char *)malloc(strlen(G.filename)+rootlen+3)) ==
data/unzip-6.0/flexos/flexos.c:687:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((rootlen = strlen(pathcomp)) > 0) {
data/unzip-6.0/funzip.c:384:7:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  n = getc(G.in);  n |= getc(G.in) << 8;
data/unzip-6.0/funzip.c:384:25:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  n = getc(G.in);  n |= getc(G.in) << 8;
data/unzip-6.0/funzip.c:400:41:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    for (n = SH(h + LOCFIL); n--; ) g = getc(G.in);
data/unzip-6.0/funzip.c:401:41:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    for (n = SH(h + LOCEXT); n--; ) g = getc(G.in);
data/unzip-6.0/funzip.c:415:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      n = getc(G.in);  n |= getc(G.in) << 8;
data/unzip-6.0/funzip.c:415:29:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      n = getc(G.in);  n |= getc(G.in) << 8;
data/unzip-6.0/funzip.c:416:23:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while (n--) g = getc(G.in);
data/unzip-6.0/funzip.c:419:19:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while ((g = getc(G.in)) != 0 && g != EOF) ;
data/unzip-6.0/funzip.c:421:19:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while ((g = getc(G.in)) != 0 && g != EOF) ;
data/unzip-6.0/funzip.c:491:15:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      ush c = getc(G.in);
data/unzip-6.0/human68k/human68k.c:74:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/human68k/human68k.c:96:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(dirname, wildspec, dirnamelen);
data/unzip-6.0/human68k/human68k.c:133:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/human68k/human68k.c:403:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (G.filename[strlen(G.filename) - 1] == '/') {
data/unzip-6.0/human68k/human68k.c:477:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(pathcomp) <= 18)
data/unzip-6.0/human68k/human68k.c:504:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(name) <= maxlen)
data/unzip-6.0/human68k/human68k.c:666:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((buildpath = (char *)malloc(strlen(G.filename)+rootlen+3)) ==
data/unzip-6.0/human68k/human68k.c:697:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((rootlen = strlen(pathcomp)) > 0) {
data/unzip-6.0/inflate.c:304:20:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#  define NEXTBYTE getchar()
data/unzip-6.0/list.c:548:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    extent fn_len = strlen(G.filename);
data/unzip-6.0/list.c:741:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (*G.message)((zvoid *)&G, (uch *)name, (ulg)strlen(name), 0);
data/unzip-6.0/macos/UnZp.h:26:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#undef getc
data/unzip-6.0/macos/UnZp.h:27:8:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#undef getchar
data/unzip-6.0/macos/UnZp.h:131:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            s_i = strlen((str2));                                   \
data/unzip-6.0/macos/UnZp.h:136:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            s_i = strlen((str1));                                   \
data/unzip-6.0/macos/UnZpLib.h:26:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#undef getc
data/unzip-6.0/macos/UnZpLib.h:27:8:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#undef getchar
data/unzip-6.0/macos/UnZpLib.h:141:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            s_i = strlen((str2));                                   \
data/unzip-6.0/macos/UnZpLib.h:146:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            s_i = strlen((str1));                                   \
data/unzip-6.0/macos/UnZpSFX.h:26:8:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#undef getc
data/unzip-6.0/macos/UnZpSFX.h:27:8:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#undef getchar
data/unzip-6.0/macos/UnZpSFX.h:138:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            s_i = strlen((str2));                                   \
data/unzip-6.0/macos/UnZpSFX.h:143:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            s_i = strlen((str1));                                   \
data/unzip-6.0/macos/UnZpSx.h:122:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            s_i = strlen((str2));                                   \
data/unzip-6.0/macos/UnZpSx.h:127:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            s_i = strlen((str1));                                   \
data/unzip-6.0/macos/source/getenv.c:140:10:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ch = getc(file);
data/unzip-6.0/macos/source/getenv.c:246:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
unsigned short length = strlen(line);
data/unzip-6.0/macos/source/getenv.c:257:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(Env->key) < length)
data/unzip-6.0/macos/source/getenv.c:308:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(Env1->value) > 0)
data/unzip-6.0/macos/source/helpers.c:78:1:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
strncpy(cstr, (char *) &pstr[1], *pstr);
data/unzip-6.0/macos/source/helpers.c:90:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    memmove(to, from, 1+strlen(from));
data/unzip-6.0/macos/source/helpers.c:96:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sstrcpy(to + strlen(to), from);
data/unzip-6.0/macos/source/maccfg.h:73:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define read            macread
data/unzip-6.0/macos/source/macdir.c:68:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        (pathLen = strlen(dirName)) >= 256) {
data/unzip-6.0/macos/source/macdir.c:163:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    dirPtr->d_namlen = strlen(name);
data/unzip-6.0/macos/source/macos.c:213:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (uO.exdir[strlen(uO.exdir)-1] != ':') {
data/unzip-6.0/macos/source/macos.c:214:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(uO.exdir, ":");
data/unzip-6.0/macos/source/macos.c:234:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/macos/source/macos.c:238:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(dirname, wildspec, dirnamelen);
data/unzip-6.0/macos/source/macos.c:261:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/macos/source/macos.c:496:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (G.filename[strlen(G.filename) - 1] == '/') {
data/unzip-6.0/macos/source/macos.c:686:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((buildpath = (char *)malloc(strlen(G.filename)+rootlen+2))
data/unzip-6.0/macos/source/macos.c:720:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((rootlen = strlen(pathcomp)) > 0) {
data/unzip-6.0/macos/source/macos.c:972:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (*G.message)((zvoid *)&G, slide, (ulg)strlen((char *)slide), 0);
data/unzip-6.0/macos/source/macos.c:1010:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        pathlen = strlen(path);
data/unzip-6.0/macos/source/macos.c:1273:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
unsigned exdirlen = strlen(uO.exdir);
data/unzip-6.0/macos/source/macos.c:1812:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
mi->FullPath      = (char *)buff; buff += strlen(mi->FullPath) + 1;
data/unzip-6.0/macos/source/macos.c:1813:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
mi->FinderComment = (char *)buff; buff += strlen(mi->FinderComment) + 1;
data/unzip-6.0/macos/source/pathname.c:110:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
return (unsigned short) strlen(VolumeName);
data/unzip-6.0/macos/source/pathname.c:128:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
unsigned short namelen, pathlen = strlen(ExtractPath);
data/unzip-6.0/macos/source/pathname.c:143:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    namelen = strlen(namePtr);
data/unzip-6.0/macos/source/pathname.c:145:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    namelen = strlen(ExtractPath);
data/unzip-6.0/macos/source/pathname.c:168:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ext_length = strlen(last_dotpos);
data/unzip-6.0/macos/source/pathname.c:201:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
unsigned short namelen, pathlen = strlen(thePath);
data/unzip-6.0/macos/source/pathname.c:212:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
namelen = strlen(namePtr);
data/unzip-6.0/macos/source/pathname.c:496:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        length = strlen(RealFn);       /* determine Fork type */
data/unzip-6.0/macos/source/pathname.c:516:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(RfDfFilen) > (sizeof(ResourceMark) - 1))
data/unzip-6.0/macos/source/pathname.c:661:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    CompletePath[strlen(CompletePath)-1] = '\0';
data/unzip-6.0/macos/source/pathname.c:665:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
pathlen = strlen(CompletePath);
data/unzip-6.0/macos/source/pathname.c:680:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
unsigned long full_length = strlen(LongFilename);
data/unzip-6.0/macos/source/pathname.c:699:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
ext_length = strlen(last_dotpos);
data/unzip-6.0/macos/source/pathname.c:711:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
num_to_cut += strlen(charnum);
data/unzip-6.0/match.c:132:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int j = strlen(pattern);
data/unzip-6.0/match.c:238:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            srest = s + (strlen((ZCONST char *)s) - strlen((ZCONST char *)p));
data/unzip-6.0/match.c:238:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            srest = s + (strlen((ZCONST char *)s) - strlen((ZCONST char *)p));
data/unzip-6.0/msdos/msdos.c:214:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    extent len = strlen(name);  /* path length to avoid strlens and strcats */
data/unzip-6.0/msdos/msdos.c:295:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/msdos/msdos.c:315:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/msdos/msdos.c:321:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(dirname, wildspec, dirnamelen);
data/unzip-6.0/msdos/msdos.c:338:21:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                    strcat(fnamestart, ".");
data/unzip-6.0/msdos/msdos.c:345:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    fnamestart += strlen(fnamestart) - 1;
data/unzip-6.0/msdos/msdos.c:364:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/msdos/msdos.c:391:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(fnamestart, ".");
data/unzip-6.0/msdos/msdos.c:395:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            fnamestart += strlen(fnamestart) - 1;
data/unzip-6.0/msdos/msdos.c:649:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (G.filename[strlen(G.filename) - 1] == '/') {
data/unzip-6.0/msdos/msdos.c:701:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(pathcomp) > 11)
data/unzip-6.0/msdos/msdos.c:785:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        for (i = strlen(pathcomp) + 1; i > 0; --i)
data/unzip-6.0/msdos/msdos.c:806:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *pEnd = pathcomp + strlen(pathcomp);
data/unzip-6.0/msdos/msdos.c:1015:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((buildpath = (char *)malloc(strlen(G.filename)+rootlen+3)) ==
data/unzip-6.0/msdos/msdos.c:1073:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((rootlen = strlen(pathcomp)) > 0) {
data/unzip-6.0/msdos/msdos.c:1209:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    fnamelength = strlen(fname);
data/unzip-6.0/msdos/msdos.c:1213:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(name, fname, fnamelength-1);
data/unzip-6.0/msdos/msdos.c:1266:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen(newlabel);
data/unzip-6.0/msdos/msdos.c:1383:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy((char *)fcb.vn, "???????????", 11);   /* i.e., "*.*" */
data/unzip-6.0/msdos/msdos.c:1407:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy((char *)fcb.vn, newlabel, len);
data/unzip-6.0/msdos/msdos.c:1409:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
            strncpy((char *)(fcb.vn+len), "           ", 11-len);
data/unzip-6.0/msdos/msdos.c:1437:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy((char *)fcb.vn, (char *)dta.vn, 11);
data/unzip-6.0/msdos/msdos.c:1438:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy((char *)fcb.nn, newlabel, len);
data/unzip-6.0/msdos/msdos.c:1440:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
            strncpy((char *)(fcb.nn+len), "           ", 11-len);
data/unzip-6.0/msdos/msdos.c:2139:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    unsigned namlen = strlen(name);
data/unzip-6.0/msdos/msdos.c:2423:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        newname[strlen(path) - 1] = '\\';   /* stat(".") fails for root! */
data/unzip-6.0/netware/netware.c:106:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/netware/netware.c:125:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/netware/netware.c:129:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(dirname, wildspec, dirnamelen);
data/unzip-6.0/netware/netware.c:159:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/netware/netware.c:300:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                extent fnlen = strlen(G.filename);
data/unzip-6.0/netware/netware.c:316:5:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    umask( (int)(tmp=umask(0)) );    /* apply mask to expanded r/w(/x) perms */
data/unzip-6.0/netware/netware.c:316:22:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    umask( (int)(tmp=umask(0)) );    /* apply mask to expanded r/w(/x) perms */
data/unzip-6.0/netware/netware.c:444:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (G.filename[strlen(G.filename) - 1] == '/') {
data/unzip-6.0/netware/netware.c:491:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sprintf(pathcomp+strlen(pathcomp), ",%03x", (int)(ft>>8) & 0xFFF);
data/unzip-6.0/netware/netware.c:669:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((buildpath = (char *)malloc(strlen(G.filename)+rootlen+
data/unzip-6.0/netware/netware.c:672:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((buildpath = (char *)malloc(strlen(G.filename)+rootlen+1))
data/unzip-6.0/netware/netware.c:702:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((rootlen = strlen(pathcomp)) > 0) {
data/unzip-6.0/os2/os2.c:474:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nLength = strlen(szName);
data/unzip-6.0/os2/os2.c:571:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  nLength = strlen(szName);
data/unzip-6.0/os2/os2.c:646:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      Info(slide, 0, ((char *)slide, " (%ld bytes ACL)", strlen(szACL)));
data/unzip-6.0/os2/os2.c:697:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((len = strlen(nbuf)) == 0)
data/unzip-6.0/os2/os2.c:714:7:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      strcpy(nbuf+len, ".");
data/unzip-6.0/os2/os2.c:730:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(nbuf+len-1, "*");
data/unzip-6.0/os2/os2.c:733:7:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      strcpy(nbuf+len, "*");
data/unzip-6.0/os2/os2.c:749:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ((dp -> _d_entry = malloc(strlen(s) + 1)) == NULL)      )
data/unzip-6.0/os2/os2.c:798:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strlen(strcpy(G.os2.dp.d_name, dirp -> dd_cp -> _d_entry));
data/unzip-6.0/os2/os2.c:963:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(G.os2.matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/os2/os2.c:983:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(G.os2.matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/os2/os2.c:987:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(G.os2.dirname, wildspec, G.os2.dirnamelen);
data/unzip-6.0/os2/os2.c:1005:21:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                    strcat(fnamestart, ".");
data/unzip-6.0/os2/os2.c:1012:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    fnamestart += strlen(fnamestart) - 1;
data/unzip-6.0/os2/os2.c:1031:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(G.os2.matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/os2/os2.c:1058:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(fnamestart, ".");
data/unzip-6.0/os2/os2.c:1062:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            fnamestart += strlen(fnamestart) - 1;
data/unzip-6.0/os2/os2.c:1207:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    G.os2.fnlen = strlen(G.filename);
data/unzip-6.0/os2/os2.c:1394:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sprintf(pathcomp+strlen(pathcomp), ",%03x", (int)(ft>>8) & 0xFFF);
data/unzip-6.0/os2/os2.c:1414:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        FSInfoBuf.cch = (BYTE)strlen(FSInfoBuf.szVolLabel);
data/unzip-6.0/os2/os2.c:1630:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if ((G.os2.lastpathcomp = (char *)malloc(strlen(pathcomp)+1)) ==
data/unzip-6.0/os2/os2.c:1742:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((G.os2.rootlen = strlen(pathcomp)) > 0) {
data/unzip-6.0/os2/os2.c:2029:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  fealst.cbList  = sizeof(fealst) - CCHMAXPATH + strlen((char *) fealst.szValue);
data/unzip-6.0/os2/os2.c:2030:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  fealst.cbName  = (BYTE) strlen((char *) fealst.szName);
data/unzip-6.0/os2/os2.c:2031:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  fealst.cbValue = sizeof(USHORT) * 2 + strlen((char *) fealst.szValue);
data/unzip-6.0/os2/os2.c:2038:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  fealst.eaSize  = strlen((char *) fealst.szValue);
data/unzip-6.0/os2/os2acl.c:255:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      cwdlen = strlen(cwd);
data/unzip-6.0/os2/os2acl.c:264:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(buffer, cwd, 2);
data/unzip-6.0/os2/os2acl.c:272:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(buffer, "/");
data/unzip-6.0/os2/os2acl.c:304:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return strlen(text);
data/unzip-6.0/os2/os2acl.c:350:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(al[cnt].acl_ugname, ptr, ptr2 - ptr);
data/unzip-6.0/os2/rexxapi.c:69:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define EZRXSTRING(r,p)  {(r).strptr=(PCH)p;(r).strlength=(ULONG)strlen((r).strptr);}
data/unzip-6.0/os2/rexxapi.c:110:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  (t)->strlength = strlen((s)); \
data/unzip-6.0/os2/rexxapi.c:184:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  G.os2.getvar_len = strlen(name);
data/unzip-6.0/os2/rexxapi.c:197:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    trav[count-1] = (char *)malloc(strlen(G.os2.buffer)+1);
data/unzip-6.0/os2/rexxapi.c:599:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  retstr->strlength = strlen(retstr->strptr);
data/unzip-6.0/os2/rexxapi.c:650:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  retstr->strlength = strlen(retstr->strptr);
data/unzip-6.0/os2/rexxapi.c:682:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len=strlen(name);
data/unzip-6.0/os2/rexxapi.c:701:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len=strlen(name);
data/unzip-6.0/os2/rexxapi.c:760:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  WriteToVariable(__G__ name, G.os2.buffer, strlen(G.os2.buffer));
data/unzip-6.0/os2/rexxapi.c:801:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (WriteToNextVariable(__G__ scan,strlen(scan)))
data/unzip-6.0/os2/rexxapi.c:837:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    WriteToNextVariable(__G__ G.filename, strlen(G.filename));
data/unzip-6.0/os2/rexxapi.c:877:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          idx = strlen(G.filename);
data/unzip-6.0/os2/rexxapi.c:881:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        WriteToVariable(__G__ G.os2.getvar_buf,G.filename+offset,strlen(G.filename+offset));
data/unzip-6.0/process.c:347:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int len=strlen(G.argv0);
data/unzip-6.0/process.c:457:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              strcpy(lastzipfn + strlen(lastzipfn), ZSUFX);
data/unzip-6.0/process.c:1106:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            siz = read(fh, waste, 1);
data/unzip-6.0/process.c:1147:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if ((G.incnt = read(G.zipfd, (char *)G.inbuf,
data/unzip-6.0/process.c:1183:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if ((G.incnt = read(G.zipfd,(char *)G.inbuf,INBUFSIZ))
data/unzip-6.0/process.c:1258:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((G.incnt = read(G.zipfd, (char *)byterecL, ECLOC64_SIZE+4))
data/unzip-6.0/process.c:1325:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((G.incnt = read(G.zipfd, (char *)byterec, ECREC64_SIZE+4))
data/unzip-6.0/process.c:1350:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if ((G.incnt = read(G.zipfd, (char *)byterec, ECREC64_SIZE+4))
data/unzip-6.0/process.c:1475:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if ((G.incnt = read(G.zipfd,(char *)G.inbuf,(unsigned int)G.ziplen))
data/unzip-6.0/process.c:2072:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         strlen(G.filename_full));
data/unzip-6.0/process.c:2098:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(G.unipath_filename,
data/unzip-6.0/process.c:2315:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(utf8buf + count, mb, c);
data/unzip-6.0/process.c:2426:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(e, "#");
data/unzip-6.0/process.c:2430:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(e, "U");
data/unzip-6.0/process.c:2432:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(e, "L");
data/unzip-6.0/process.c:2438:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((r = malloc(strlen(e) + 1)) == NULL) {
data/unzip-6.0/process.c:2463:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(e);
data/unzip-6.0/process.c:2541:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
        strncat(buffer, buf, b);
data/unzip-6.0/process.c:2550:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
      strncat(buffer, buf, b);
data/unzip-6.0/process.c:2559:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((local_string = (char *)malloc(strlen(buffer) + 1)) != NULL) {
data/unzip-6.0/process.c:2579:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((display_string = (char *)malloc(strlen(local_string) + 1)) == NULL) {
data/unzip-6.0/process.c:2589:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((ebc = malloc(strlen(display_string) + 1)) ==  NULL) {
data/unzip-6.0/process.c:2623:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  wsize = mbstowcs(NULL, local_string, strlen(local_string) + 1);
data/unzip-6.0/process.c:2633:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  wsize = mbstowcs(wc_string, local_string, strlen(local_string) + 1);
data/unzip-6.0/qdos/makesfx.c:63:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    read(fd, &ntc, 8);
data/unzip-6.0/qdos/makesfx.c:135:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if((read(fd, tmp, 4) == 4))
data/unzip-6.0/qdos/makesfx.c:174:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                    n = read(fd, p, sd.d_length);
data/unzip-6.0/qdos/makesfx.c:202:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                    n = read(fd, p, xd.d_length);
data/unzip-6.0/qdos/makesfx.c:222:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                        while((n = read(fd, p, RBUFSIZ)) > 0)
data/unzip-6.0/qdos/qdos.c:257:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/qdos/qdos.c:268:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            dirnamelen = strlen(basedir);
data/unzip-6.0/qdos/qdos.c:277:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/qdos/qdos.c:281:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(dirname, wildspec, dirnamelen);
data/unzip-6.0/qdos/qdos.c:304:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/qdos/qdos.c:449:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                extent fnlen = strlen(G.filename);
data/unzip-6.0/qdos/qdos.c:465:5:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    umask( (int)(tmp=umask(0)) );    /* apply mask to expanded r/w(/x) perms */
data/unzip-6.0/qdos/qdos.c:465:22:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    umask( (int)(tmp=umask(0)) );    /* apply mask to expanded r/w(/x) perms */
data/unzip-6.0/qdos/qdos.c:585:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (G.filename[strlen(G.filename) - 1] == '/') {
data/unzip-6.0/qdos/qdos.c:586:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        G.filename[strlen(G.filename) - 1] = '_';
data/unzip-6.0/qdos/qdos.c:793:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((buildpath = (char *)malloc(strlen(G.filename)+rootlen+1))
data/unzip-6.0/qdos/qdos.c:824:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((rootlen = strlen(pathcomp)) > 0) {
data/unzip-6.0/qdos/qdos.c:914:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (!strncmp(extra->longid, LONGID, strlen(LONGID)))
data/unzip-6.0/qdos/qdos.c:926:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (!strncmp(jbp->longid, JBLONGID, strlen(JBLONGID)))
data/unzip-6.0/qdos/qdos.c:1079:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (*G.message)((zvoid *)&G, slide, (ulg)strlen((char *)slide), 0);
data/unzip-6.0/tandem/tandem.c:52:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((x = malloc(strlen(n) + 4)) == NULL)  /* + 4 for safety */
data/unzip-6.0/tandem/tandem.c:86:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    y = x + strlen(x);
data/unzip-6.0/tandem/tandem.c:100:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      z = t + strlen(t);
data/unzip-6.0/tandem/tandem.c:137:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        y = x + strlen(x);
data/unzip-6.0/tandem/tandem.c:284:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(fname);
data/unzip-6.0/tandem/tandem.c:291:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(fname);
data/unzip-6.0/tandem/tandem.c:315:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    unsigned read   : 3;
data/unzip-6.0/tandem/tandem.c:360:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(fname);
data/unzip-6.0/tandem/tandem.c:401:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(fname);
data/unzip-6.0/tandem/tandem.c:457:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
    strncat(ext, fptr, _min(EXTENSION_MAX, strlen(fptr)));
data/unzip-6.0/tandem/tandem.c:457:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strncat(ext, fptr, _min(EXTENSION_MAX, strlen(fptr)));
data/unzip-6.0/tandem/tandem.c:460:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
    strncat(fname, fstart, _min(FILENAME_MAX, (fptr - fstart)));
data/unzip-6.0/tandem/tandem.c:464:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
    strncat(fname, srce, _min(FILENAME_MAX, strlen(srce)));
data/unzip-6.0/tandem/tandem.c:464:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strncat(fname, srce, _min(FILENAME_MAX, strlen(srce)));
data/unzip-6.0/tandem/tandem.c:578:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  fnamelen = strlen(fname);
data/unzip-6.0/tandem/tandem.c:788:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   snamelen = strlen(sname);
data/unzip-6.0/tandem/tandem.c:844:6:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
     strncat(dirp->D_curpos->d_name,fname,fnamelen);
data/unzip-6.0/tandem/tandem.h:185:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  unsigned read      : 3;
data/unzip-6.0/tandem/tanunz.c:84:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/tandem/tanunz.c:91:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        dirnamelen = strlen(wildspec);
data/unzip-6.0/tandem/tanunz.c:96:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
             strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/tandem/tanunz.c:129:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/tandem/tanunz.c:310:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(G.filename);
data/unzip-6.0/tandem/tanunz.c:449:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                extent fnlen = strlen(G.filename);
data/unzip-6.0/tandem/tanunz.c:465:5:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    umask( (int)(tmp=umask(0)) );    /* apply mask to expanded r/w(/x) perms */
data/unzip-6.0/tandem/tanunz.c:465:22:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    umask( (int)(tmp=umask(0)) );    /* apply mask to expanded r/w(/x) perms */
data/unzip-6.0/tandem/tanunz.c:566:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (G.filename[strlen(G.filename) - 1] == TANDEM_DELIMITER) {
data/unzip-6.0/tandem/tanunz.c:713:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            fnamelen = strlen(fname);
data/unzip-6.0/tandem/tanunz.c:714:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            extlen = strlen(ext);
data/unzip-6.0/tandem/tanunz.c:760:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((buildpath = (char *)malloc(strlen(G.filename)+rootlen+1))
data/unzip-6.0/tandem/tanunz.c:791:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((rootlen = strlen(pathcomp)) > 0) {
data/unzip-6.0/tandem/tanunz.c:916:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(G.filename);
data/unzip-6.0/tandem/tanunz.c:1043:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (*G.message)((zvoid *)&G, slide, (ulg)strlen((char *)slide), 0);
data/unzip-6.0/theos/_setargv.c:79:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(disk, p, 2);
data/unzip-6.0/theos/_stat.c:38:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
        umask |= S_IWUSR|S_IWGRP;
data/unzip-6.0/theos/_stat.c:41:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
        umask |= S_IXUSR|S_IXGRP;
data/unzip-6.0/theos/_stat.c:44:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
        umask |= S_IEUSR|S_IEGRP;
data/unzip-6.0/theos/_stat.c:48:13:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
            umask |= S_IROTH|S_IXOTH;
data/unzip-6.0/theos/_stat.c:50:13:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
            umask |= S_IROTH;
data/unzip-6.0/theos/_stat.c:54:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
        umask |= S_IWOTH;
data/unzip-6.0/theos/_stat.c:58:13:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
            umask |= S_IMODF;
data/unzip-6.0/theos/_stat.c:60:13:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
            umask |= S_IXOTH;
data/unzip-6.0/theos/_stat.c:64:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
        umask |= S_INHID;
data/unzip-6.0/theos/_stat.c:66:12:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    return umask;
data/unzip-6.0/theos/_stat.c:144:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((ifn = (char *)malloc(strlen(fn)+1)) == NULL) {
data/unzip-6.0/theos/_stat.c:334:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        (mypath = (char *)malloc(strlen(dirpath)+1)) == NULL) {
data/unzip-6.0/theos/_stat.c:340:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(mypath);
data/unzip-6.0/theos/theos.c:200:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/theos/theos.c:204:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(dirname, wildspec, dirnamelen);
data/unzip-6.0/theos/theos.c:230:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/theos/theos.c:377:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                extent fnlen = strlen(G.filename);
data/unzip-6.0/theos/theos.c:584:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (G.filename[strlen(G.filename) - 1] == '/') {
data/unzip-6.0/theos/theos.c:586:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (islib() && G.filename[strlen(G.filename) - 1] == '/')
data/unzip-6.0/theos/theos.c:587:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            G.filename[strlen(G.filename) - 1] = '\0';
data/unzip-6.0/theos/theos.c:619:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sprintf(pathcomp+strlen(pathcomp), ",%03x", (int)(ft>>8) & 0xFFF);
data/unzip-6.0/theos/theos.c:852:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((buildpath = (char *)malloc(strlen(G.filename)+rootlen+
data/unzip-6.0/theos/theos.c:855:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((buildpath = (char *)malloc(strlen(G.filename)+rootlen+1))
data/unzip-6.0/theos/theos.c:885:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((rootlen = strlen(pathcomp)) > 0) {
data/unzip-6.0/theos/theos.c:898:17:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
                strcpy(tmproot, "/");
data/unzip-6.0/theos/theos.c:931:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(rootdisk, p, 2);
data/unzip-6.0/theos/theos.c:1124:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d_entry = (uxdirattr *)malloc(sizeof(uxdirattr) + strlen(G.filename));
data/unzip-6.0/theos/theos.c:1202:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (*G.message)((zvoid *)&G, slide, (ulg)strlen((char *)slide), 0);
data/unzip-6.0/theos/thscfg.h:32:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
size_t read(int fd, char *buf, size_t len);
data/unzip-6.0/timezone.c:466:12:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    (void) strncpy(cp, stdname, stdlen);
data/unzip-6.0/timezone.c:470:16:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        (void) strncpy(cp, dstname, dstlen);
data/unzip-6.0/timezone.c:497:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                old_TZstring = realloc(old_TZstring, strlen(TZstring) + 1);
data/unzip-6.0/timezone.c:499:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                old_TZstring = malloc(strlen(TZstring) + 1);
data/unzip-6.0/tops20/tops20.c:229:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (*G.message)((zvoid *)&G, slide, (ulg)strlen((char *)slide), 0);
data/unzip-6.0/ttyio.c:463:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    read(f, &c, 1);             /* read our character */
data/unzip-6.0/ttyio.c:497:5:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    read(f, &c, 1);
data/unzip-6.0/ttyio.c:500:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            read(f, &c2, 1);   /* throw away all other chars up thru newline */
data/unzip-6.0/ttyio.c:631:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            read(f, &c, 1);
data/unzip-6.0/ttyio.c:684:28:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if ((c = (char)getc(f)) == '\r')
data/unzip-6.0/ttyio.h:147:19:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#  define getch() getchar() /* not correct, but may not be on a console */
data/unzip-6.0/unix/unix.c:209:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(G.matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/unix/unix.c:228:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(G.matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/unix/unix.c:232:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(G.dirname, wildspec, G.dirnamelen);
data/unzip-6.0/unix/unix.c:265:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(G.matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/unix/unix.c:459:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                extent fnlen = strlen(G.filename);
data/unzip-6.0/unix/unix.c:483:5:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    umask( (int)(tmp=umask(0)) );    /* apply mask to expanded r/w(/x) perms */
data/unzip-6.0/unix/unix.c:483:22:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
    umask( (int)(tmp=umask(0)) );    /* apply mask to expanded r/w(/x) perms */
data/unzip-6.0/unix/unix.c:634:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (G.filename[strlen(G.filename) - 1] == '/') {
data/unzip-6.0/unix/unix.c:706:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sprintf(pathcomp+strlen(pathcomp), ",%03x", (int)(ft>>8) & 0xFFF);
data/unzip-6.0/unix/unix.c:909:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((G.buildpath = (char *)malloc(strlen(G.filename)+G.rootlen+
data/unzip-6.0/unix/unix.c:912:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((G.buildpath = (char *)malloc(strlen(G.filename)+G.rootlen+1))
data/unzip-6.0/unix/unix.c:944:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((G.rootlen = strlen(pathcomp)) > 0) {
data/unzip-6.0/unix/unix.c:1137:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                ucsize + strlen(G.filename);
data/unzip-6.0/unix/unix.c:1330:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    d_entry = (uxdirattr *)malloc(sizeof(uxdirattr) + strlen(G.filename));
data/unzip-6.0/unix/unix.c:1460:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      (strlen(__VERSION__) > 8)? "(gcc)" :
data/unzip-6.0/unix/unix.c:1715:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (*G.message)((zvoid *)&G, slide, (ulg)strlen((char *)slide), 0);
data/unzip-6.0/unix/unix.c:1818:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (!strncmp(extra->longid, LONGID, strlen(LONGID)))
data/unzip-6.0/unix/unix.c:1835:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (!strncmp(jbp->longid, JBLONGID, strlen(JBLONGID)))
data/unzip-6.0/unzip.c:937:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((sz[0] != 'F') || (strlen(sz) != 16))
data/unzip-6.0/unzip.c:945:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((sz[0] != '8') || (strlen(sz) != 16))
data/unzip-6.0/unzip.c:1033:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (p = argv[0] + strlen(argv[0]); p >= argv[0]; --p) {
data/unzip-6.0/unzip.c:1078:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           if (strlen(argv[i]) > ((WSIZE>>2) - 160)) {
data/unzip-6.0/unzip.c:1358:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    s += strlen(s);
data/unzip-6.0/unzpriv.h:442:11:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
#  define umask(n)            /* don't have umask() on MTS */
data/unzip-6.0/unzpriv.h:537:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   extern int open(), close(), read();
data/unzip-6.0/unzpriv.h:2696:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#  define read(fd,buf,n) fread((buf),1,(n),(FILE *)(fd))
data/unzip-6.0/unzpriv.h:2722:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     (ulg)(sprintf sprf_arg, strlen((char *)(buf))), (flag))
data/unzip-6.0/unzpriv.h:2787:21:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#  define NEXTBYTE  getc(G.in)   /* redefined in crypt.h if full version */
data/unzip-6.0/vms/cmdline.c:756:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(&the_cmd_line[x+3], password_arg.dsc$a_pointer,
data/unzip-6.0/vms/cmdline.c:771:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(&the_cmd_line[x], work_str.dsc$a_pointer,
data/unzip-6.0/vms/cmdline.c:785:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(&the_cmd_line[x+3], output_directory.dsc$a_pointer,
data/unzip-6.0/vms/cmdline.c:842:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ptr += strlen(ptr) + 1;
data/unzip-6.0/vms/vms.c:492:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    FAB_OR_NAML(fab, nam).FAB_OR_NAML_FNS = strlen(G.zipfn);
data/unzip-6.0/vms/vms.c:748:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        FAB_OR_NAML(fileblk, nam).FAB_OR_NAML_FNS = strlen(G.filename);
data/unzip-6.0/vms/vms.c:952:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        FAB_OR_NAML(*outfab, nam).FAB_OR_NAML_FNS = strlen(G.filename);
data/unzip-6.0/vms/vms.c:1244:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        FAB_OR_NAML(fileblk, nam).FAB_OR_NAML_FNS = strlen(G.filename);
data/unzip-6.0/vms/vms.c:1485:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    FAB_OR_NAML(*outfab, nam).FAB_OR_NAML_FNS = strlen(G.filename);
data/unzip-6.0/vms/vms.c:1584:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (answ[strlen(answ) - 1] == '\n')
data/unzip-6.0/vms/vms.c:1585:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                answ[strlen(answ) - 1] = '\0';
data/unzip-6.0/vms/vms.c:1735:21:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                    strncpy(verbuf, (char *) vers, verlen);
data/unzip-6.0/vms/vms.c:1900:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strlen(verbuf) + 1;  /* Transmit ending '\0' too */
data/unzip-6.0/vms/vms.c:2745:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                             ucsize + strlen(G.filename);
data/unzip-6.0/vms/vms.c:2991:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    dir_spec_len = strlen(dir_spec);
data/unzip-6.0/vms/vms.c:3062:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    fnlen = strlen(G.filename);
data/unzip-6.0/vms/vms.c:3111:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(VmsAtt(d)->fn, "]");
data/unzip-6.0/vms/vms.c:3271:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    FAB_OR_NAML(*outfab, nam).FAB_OR_NAML_FNS = strlen(dir_name);
data/unzip-6.0/vms/vms.c:3633:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    FAB_OR_NAML(fileblk, nam).FAB_OR_NAML_FNS = strlen(fname);
data/unzip-6.0/vms/vms.c:3921:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        FAB_OR_NAML(fab, nam).FAB_OR_NAML_FNS = strlen(last_wild);
data/unzip-6.0/vms/vms.c:4029:13:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
            umask(defprot = umask(0));
data/unzip-6.0/vms/vms.c:4029:29:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
            umask(defprot = umask(0));
data/unzip-6.0/vms/vms.c:4199:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    FAB_OR_NAML(fab, nam).FAB_OR_NAML_DNS = strlen(PATH_DEFAULT);
data/unzip-6.0/vms/vms.c:4202:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    FAB_OR_NAML(fab, nam).FAB_OR_NAML_FNS = strlen(path);
data/unzip-6.0/vms/vms.c:4327:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    endp = src + strlen(src);   /* Pointer to the NUL-terminator of src. */
data/unzip-6.0/vms/vms.c:4398:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    endp = src + strlen(src);   /* Pointer to the NUL-terminator of src. */
data/unzip-6.0/vms/vms.c:4620:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(cp) == 0)
data/unzip-6.0/vms/vms.c:4727:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        FAB_OR_NAML(fab, nam).FAB_OR_NAML_FNS = strlen(pathcomp);
data/unzip-6.0/vms/vms.c:4731:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        FAB_OR_NAML(fab, nam).FAB_OR_NAML_DNS = strlen(PATH_DEFAULT);
data/unzip-6.0/vms/vms.c:4846:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ( strlen(G.filename) + rootlen + 13 > NAM_MAXRSS )
data/unzip-6.0/vms/vms.c:4870:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cmplen = strlen(pathcomp);
data/unzip-6.0/vms/vms.c:4927:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            FAB_OR_NAML(fab, nam).FAB_OR_NAML_FNS = strlen(G.filename);
data/unzip-6.0/vms/vms.c:4991:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if ( strlen(pathcomp) + (end-pathbuf) > 255 )
data/unzip-6.0/vms/vms.c:4994:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            end += strlen(pathcomp);
data/unzip-6.0/vms/vms.c:5072:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    FAB_OR_NAML(fab, nam).FAB_OR_NAML_FNS = strlen(filenam);
data/unzip-6.0/vms/vms.c:5455:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(vms_vers, VMS_VERSION, sizeof(vms_vers));
data/unzip-6.0/win32/win32.c:225:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    extent len = strlen(n);
data/unzip-6.0/win32/win32.c:230:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        (p = malloc(strlen(n) + 5)) == NULL)
data/unzip-6.0/win32/win32.c:1062:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *ansi_name = (char *)alloca(strlen(G.filename) + 1);
data/unzip-6.0/win32/win32.c:1201:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                  + strlen(G.filename));
data/unzip-6.0/win32/win32.c:1243:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ansi_name = (char *)alloca(strlen(d->fn) + 1);
data/unzip-6.0/win32/win32.c:1342:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *ansi_name = (char *)alloca(strlen(fname) + 1);
data/unzip-6.0/win32/win32.c:1415:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char *ansi_name = (char *)alloca(strlen(name) + 1);
data/unzip-6.0/win32/win32.c:1440:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(G.lastRootPath, tmp0, 2);   /* Build the root path name, */
data/unzip-6.0/win32/win32.c:1510:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(G.matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/win32/win32.c:1530:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(G.matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/win32/win32.c:1534:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(G.dirname, wildspec, G.dirnamelen);
data/unzip-6.0/win32/win32.c:1551:21:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                    strcat(fnamestart, ".");
data/unzip-6.0/win32/win32.c:1557:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    fnamestart = plastchar(fnamestart, strlen(fnamestart));
data/unzip-6.0/win32/win32.c:1572:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(G.matchname, wildspec, FILNAMSIZ);
data/unzip-6.0/win32/win32.c:1599:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(fnamestart, ".");
data/unzip-6.0/win32/win32.c:1603:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            fnamestart = plastchar(fnamestart, strlen(fnamestart));
data/unzip-6.0/win32/win32.c:1684:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    G.fnlen = strlen(G.filename);
data/unzip-6.0/win32/win32.c:1814:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char *ansi_name = (char *)alloca(strlen(G.filename) + 1);
data/unzip-6.0/win32/win32.c:1885:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sprintf(pathcomp+strlen(pathcomp), ",%03x", (int)(ft>>8) & 0xFFF);
data/unzip-6.0/win32/win32.c:1903:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char *ansi_name = (char *)alloca(strlen(G.filename) + 1);
data/unzip-6.0/win32/win32.c:1976:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        for (i = strlen(pathcomp) + 1; i > 0; --i)
data/unzip-6.0/win32/win32.c:2411:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((G.rootlen = strlen(pathcomp)) > 0) {
data/unzip-6.0/win32/win32.c:2726:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char *ansi_path = (char *)alloca(strlen(path) + 1);
data/unzip-6.0/win32/win32.c:2792:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char *ansi_path = (char *)alloca(strlen(path) + 1);
data/unzip-6.0/win32/win32.c:3003:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
        strncat(buffer, buf, 1);
data/unzip-6.0/win32/win32.c:3012:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
      strncat(buffer, buf, bytes_char);
data/unzip-6.0/win32/win32.c:3021:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((local_string = (char *)realloc(buffer, strlen(buffer) + 1)) == NULL) {
data/unzip-6.0/wince/intrface.cpp:384:17:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int length = _tcslen(szDirectory);
data/unzip-6.0/wince/intrface.cpp:419:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
   strcat(g_szExtractToDirectory, "\\");
data/unzip-6.0/wince/intrface.cpp:888:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int length = strlen(szPath) + strlen(szMethod);
data/unzip-6.0/wince/intrface.cpp:888:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int length = strlen(szPath) + strlen(szMethod);
data/unzip-6.0/wince/intrface.cpp:935:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   strcpy(g_pFileLast->szPathAndMethod + strlen(szPath) + 1, szMethod);
data/unzip-6.0/wince/intrface.cpp:1217:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(szRoot, szPath, 9);
data/unzip-6.0/wince/intrface.cpp:1236:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(szRoot, szPath, 3);
data/unzip-6.0/wince/intrface.cpp:1417:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      G.matchname = new char[strlen(wildspec) + 1];
data/unzip-6.0/wince/intrface.cpp:1528:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        pOut = szBuffer + strlen(szBuffer);
data/unzip-6.0/wince/intrface.cpp:1717:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        G.rootlen = strlen(pathcomp);
data/unzip-6.0/wince/intrface.cpp:1848:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
        strncat(buffer, buf, 1);
data/unzip-6.0/wince/intrface.cpp:1857:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
      strncat(buffer, buf, bytes_char);
data/unzip-6.0/wince/intrface.cpp:1866:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((local_string = (char *)realloc(buffer, strlen(buffer) + 1)) == NULL) {
data/unzip-6.0/wince/wcecfg.h:150:21:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
#  define MBSTOTSTR strncpy
data/unzip-6.0/wince/wcecfg.h:151:21:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
#  define TSTRTOMBS strncpy
data/unzip-6.0/wince/wince.cpp:205:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int __cdecl read(int handle, void *buffer, unsigned int count) {
data/unzip-6.0/wince/wince.h:190:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
ZCRTIMP int __cdecl read(int, void *, unsigned int);
data/unzip-6.0/wince/winmain.cpp:553:28:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   LPTSTR szEnd = szPath + _tcslen(szPath);
data/unzip-6.0/wince/winmain.cpp:564:45:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               (_tcsncmp(szTstPath, szPath, _tcslen(szPath)) != 0))
data/unzip-6.0/wince/winmain.cpp:647:30:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      LPTSTR szEnd = szKey + _tcslen(szKey);
data/unzip-6.0/wince/winmain.cpp:724:23:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t length = _tcslen(szExtension) - 1 + _tcslen(szDescription);
data/unzip-6.0/wince/winmain.cpp:724:50:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t length = _tcslen(szExtension) - 1 + _tcslen(szDescription);
data/unzip-6.0/wince/winmain.cpp:738:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t sizext = (strlen(pft->szExtAndDesc) + 1);
data/unzip-6.0/wince/winmain.cpp:1376:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         MBSTOTSTR(plvdi->item.pszText, pFile->szPathAndMethod + strlen(pFile->szPathAndMethod) + 1,
data/unzip-6.0/wince/winmain.cpp:1513:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         result = _stricmp(pFile1->szPathAndMethod + strlen(pFile1->szPathAndMethod) + 1,
data/unzip-6.0/wince/winmain.cpp:1514:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                           pFile2->szPathAndMethod + strlen(pFile2->szPathAndMethod) + 1);
data/unzip-6.0/wince/winmain.cpp:1550:26:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t lenPrefix = _tcslen(szCaption);
data/unzip-6.0/wince/winmain.cpp:1623:26:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   DrawText(hdc, szPath, _tcslen(szPath), &rc,
data/unzip-6.0/wince/winmain.cpp:1810:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               pFile->szType = pft->szExtAndDesc + strlen(pft->szExtAndDesc) + 1;
data/unzip-6.0/wince/winmain.cpp:2043:28:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   LPTSTR szEnd = szPath + _tcslen(szPath);
data/unzip-6.0/wince/winmain.cpp:2111:41:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       sizeof(TCHAR) * (_tcslen(szValue) + 1));
data/unzip-6.0/wince/winmain.cpp:2136:38:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    sizeof(TCHAR) * (_tcslen(szValue) + 1));
data/unzip-6.0/wince/winmain.cpp:2687:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            LPCSTR szCurMethod = pFile->szPathAndMethod + strlen(pFile->szPathAndMethod) + 1;
data/unzip-6.0/wince/winmain.cpp:2998:35:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  size_t length = _tcslen(szPath);
data/unzip-6.0/wince/winmain.cpp:3038:20:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size_t length = _tcslen(szInitialDir);
data/unzip-6.0/wince/winmain.cpp:3067:14:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      szPath[_tcslen(szPath) - 1] = TEXT('\0');
data/unzip-6.0/wince/winmain.cpp:3103:20:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size_t length = _tcslen(szPath);
data/unzip-6.0/wince/winmain.cpp:3488:24:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t preflen = _tcslen(szBuffer);
data/unzip-6.0/windll/windll.c:141:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (((*pargVee)[i] = (char *)malloc(sizeof(char) * strlen(cmd)+1 ))
data/unzip-6.0/windll/windll.c:401:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       char *pExDirRoot = (char *)malloc(strlen(lpDCL->lpszExtractDir)+1);
data/unzip-6.0/windll/windll.c:409:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       if (strlen(pExDirRoot) >= FILNAMSIZ)
data/unzip-6.0/windll/windll.c:427:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(lpDCL->lpszZipFN) >= FILNAMSIZ)
data/unzip-6.0/windll/windll.c:497:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(ifnv[f_cnt]) > ((WSIZE>>2) - 160)) {
data/unzip-6.0/windll/windll.c:515:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            bufsize += strlen(ifnv[f_cnt]) + 1;
data/unzip-6.0/windll/windll.c:530:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                  (strlen(intern_ifv[f_cnt]) + 1);
data/unzip-6.0/windll/windll.c:539:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(xfnv[f_cnt]) > ((WSIZE>>2) - 160))
data/unzip-6.0/windll/windll.c:570:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            bufsize += strlen(xfnv[f_cnt]) + 1;
data/unzip-6.0/windll/windll.c:590:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                  (strlen(intern_xfv[f_cnt]) + 1);
data/unzip-6.0/windll/windll.c:919:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    intern_zip = (char *)malloc(strlen(zip)+1);
data/unzip-6.0/windll/windll.c:924:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    intern_file = (char *)malloc(strlen(file)+1);
data/unzip-6.0/windll/windll.c:1022:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    patternLen = strlen(pattern);
data/unzip-6.0/windll/windll.c:1032:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(sz, " ");
data/unzip-6.0/windll/windll.c:1034:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(sz, " ");
data/unzip-6.0/windll/windll.c:1039:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        for (i = 0; i < strlen(sz); i++)
data/unzip-6.0/zipinfo.c:1557:37:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                                    strncpy(q+2,
data/unzip-6.0/zipinfo.c:1585:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            len = strlen(types);
data/unzip-6.0/zipinfo.c:1594:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            len = strlen(types);

ANALYSIS SUMMARY:

Hits = 1855
Lines analyzed = 89046 in approximately 2.55 seconds (34914 lines/second)
Physical Source Lines of Code (SLOC) = 59268
Hits@level = [0] 224 [1] 604 [2] 646 [3]  36 [4] 526 [5]  43
Hits@level+ = [0+] 2079 [1+] 1855 [2+] 1251 [3+] 605 [4+] 569 [5+]  43
Hits/KSLOC@level+ = [0+] 35.078 [1+] 31.2985 [2+] 21.1075 [3+] 10.2079 [4+] 9.60046 [5+] 0.725518
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.