Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/xabacus-8.2.9/Abacus.c Examining data/xabacus-8.2.9/AbacusD.c Examining data/xabacus-8.2.9/timer.c Examining data/xabacus-8.2.9/xabacus.c Examining data/xabacus-8.2.9/vms/vms_mmov.c Examining data/xabacus-8.2.9/vms/vms_amd.c Examining data/xabacus-8.2.9/vms/vms_amd.h Examining data/xabacus-8.2.9/file.c Examining data/xabacus-8.2.9/Abacus.h Examining data/xabacus-8.2.9/AbacusU.c Examining data/xabacus-8.2.9/version.h Examining data/xabacus-8.2.9/xwin.c Examining data/xabacus-8.2.9/AbacusT.c Examining data/xabacus-8.2.9/xwin.h Examining data/xabacus-8.2.9/AbacusC.c Examining data/xabacus-8.2.9/AbacusM.c Examining data/xabacus-8.2.9/sound.c Examining data/xabacus-8.2.9/AbacusE.c Examining data/xabacus-8.2.9/timer.h Examining data/xabacus-8.2.9/rngs.c Examining data/xabacus-8.2.9/AbacusP.h Examining data/xabacus-8.2.9/rngs.h Examining data/xabacus-8.2.9/file.h Examining data/xabacus-8.2.9/AbacusF.c Examining data/xabacus-8.2.9/sound.h FINAL RESULTS: data/xabacus-8.2.9/AbacusM.c:591:9: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void) strncat(buf, fltbuf, STRING_SIZE); data/xabacus-8.2.9/AbacusM.c:627:11: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void) strncat(buf, halftwelfthStrings[1], MAX_HALFTWELFTH); data/xabacus-8.2.9/AbacusM.c:630:11: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void) strncat(buf, halftwelfthGlyphs[1], MAX_HALFTWELFTH_GLYPHS); data/xabacus-8.2.9/AbacusM.c:634:11: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void) strncat(buf, twelfthStrings[fraction], MAX_TWELFTH); data/xabacus-8.2.9/AbacusM.c:637:11: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void) strncat(buf, twelfthGlyphs[fraction], MAX_TWELFTH_GLYPHS); data/xabacus-8.2.9/AbacusM.c:646:11: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void) strncat(buf, halftwelfthStrings[0], MAX_HALFTWELFTH); data/xabacus-8.2.9/AbacusM.c:648:11: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void) strncat(buf, halftwelfthGlyphs[0], MAX_HALFTWELFTH_GLYPHS); data/xabacus-8.2.9/AbacusM.c:656:12: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void) strncat(buf, subeighthStrings[subfraction], MAX_SUBEIGHTH); data/xabacus-8.2.9/AbacusM.c:658:12: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void) strncat(buf, subtwelfthStrings[subfraction], MAX_SUBTWELFTH); data/xabacus-8.2.9/AbacusM.c:661:12: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void) strncat(buf, subeighthGlyphs[subfraction], MAX_SUBEIGHTH_GLYPHS); data/xabacus-8.2.9/AbacusM.c:663:12: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void) strncat(buf, subtwelfthGlyphs[subfraction], MAX_SUBTWELFTH_GLYPHS); data/xabacus-8.2.9/AbacusM.c:673:10: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void) strncat(&buf[position], oldRoman[place], MAX_OLDROMAN); data/xabacus-8.2.9/AbacusM.c:768:10: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void) strncat(buf, fractbuf, MAX_ROMANFRACT); data/xabacus-8.2.9/AbacusT.c:1519:9: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void) strncat(buffer1, buf, CALC_STRING_SIZE - 1); data/xabacus-8.2.9/AbacusT.c:1528:9: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void) strncat(buffer1, buf, CALC_STRING_SIZE - 1); data/xabacus-8.2.9/AbacusT.c:1539:9: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void) strncat(buffer1, buf, CALC_STRING_SIZE - 1); data/xabacus-8.2.9/AbacusT.c:2389:12: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void) strncat(buffer1, buf, CALC_STRING_SIZE - 1); data/xabacus-8.2.9/AbacusT.c:3182:12: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void) strncat(buffer1, buf, CALC_STRING_SIZE - 1); data/xabacus-8.2.9/AbacusT.c:3211:13: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void) strncat(buffer1, buf, CALC_STRING_SIZE - 1); data/xabacus-8.2.9/AbacusT.c:3227:12: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. (void) strncat(buffer1, buf, CALC_STRING_SIZE - 1); data/xabacus-8.2.9/xabacus.c:1586:4: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. strncat(descriptionHelp, description2Help, DESCRIPTION2_SIZE); data/xabacus-8.2.9/xabacus.c:4626:2: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. strncat(descriptionHelp, description2Help, DESCRIPTION2_SIZE); data/xabacus-8.2.9/xabacus.c:4635:2: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. strncat(optionsHelp, options2Help, OPTIONS2_SIZE); data/xabacus-8.2.9/xabacus.c:4637:2: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. strncat(optionsHelp, options3Help, OPTIONS3_SIZE); data/xabacus-8.2.9/xabacus.c:4639:2: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. strncat(optionsHelp, options4Help, OPTIONS4_SIZE); data/xabacus-8.2.9/Abacus.c:635:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(p, text); data/xabacus-8.2.9/Abacus.c:6706:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buf, "Saved to %s.", SCRIPTFILE); data/xabacus-8.2.9/Abacus.c:7306:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buf, "Saved to %s.", SCRIPTFILE); data/xabacus-8.2.9/Abacus.c:7520:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buf, "Cannot write to %s.", data/xabacus-8.2.9/AbacusC.c:1258:11: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). (void) strcat(sb, numberString); data/xabacus-8.2.9/AbacusD.c:274:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buf, data/xabacus-8.2.9/AbacusD.c:286:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buf, data/xabacus-8.2.9/AbacusD.c:564:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buf, data/xabacus-8.2.9/AbacusD.c:593:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buf, data/xabacus-8.2.9/AbacusE.c:274:12: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(tmp, (char *) value); data/xabacus-8.2.9/AbacusE.c:397:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(tmp, (char *) value); data/xabacus-8.2.9/AbacusT.c:601:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(string, &(string[1])); data/xabacus-8.2.9/AbacusT.c:604:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(&(string[1]), &(string[2])); data/xabacus-8.2.9/AbacusT.c:783:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(my, string); data/xabacus-8.2.9/AbacusT.c:806:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(group, "%s%s%s", data/xabacus-8.2.9/AbacusT.c:811:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(group, "%s%s%02d", data/xabacus-8.2.9/AbacusT.c:815:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(group, "%s%s%03d", data/xabacus-8.2.9/AbacusT.c:876:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(temp, bString); data/xabacus-8.2.9/AbacusT.c:877:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(bString, "%c%s", '0', temp); data/xabacus-8.2.9/AbacusT.c:881:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(temp, aString); data/xabacus-8.2.9/AbacusT.c:882:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(aString, "%c%s", '0', temp); data/xabacus-8.2.9/AbacusT.c:1161:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(newString, string); data/xabacus-8.2.9/AbacusT.c:1495:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer3, data/xabacus-8.2.9/AbacusT.c:1796:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(w->abacus.cString, w->abacus.rString); data/xabacus-8.2.9/AbacusT.c:2067:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(buffer, w->abacus.bString); data/xabacus-8.2.9/AbacusT.c:2110:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(buffer, w->abacus.bString); data/xabacus-8.2.9/AbacusT.c:2112:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(buffer, w->abacus.cString); data/xabacus-8.2.9/AbacusT.c:2160:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer1, "Taking %s Root of %s", data/xabacus-8.2.9/AbacusT.c:2210:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer3, "%s %s", data/xabacus-8.2.9/AbacusT.c:2220:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(w->abacus.aString, "%s.", w->abacus.rString); data/xabacus-8.2.9/AbacusT.c:2239:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer1, "%sing %s %c %s", data/xabacus-8.2.9/AbacusT.c:2261:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer3, data/xabacus-8.2.9/AbacusT.c:2311:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer3, data/xabacus-8.2.9/AbacusT.c:2320:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer3, "%s %s", data/xabacus-8.2.9/AbacusT.c:2349:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer1, "Moving %s from primary to right auxiliary", data/xabacus-8.2.9/AbacusT.c:2369:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(w->abacus.aString, w->abacus.rString); data/xabacus-8.2.9/AbacusT.c:2380:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer1, "Multiplying %s %c %s", data/xabacus-8.2.9/AbacusT.c:2407:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer3, data/xabacus-8.2.9/AbacusT.c:2453:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer3, data/xabacus-8.2.9/AbacusT.c:2463:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer3, "%s %s", data/xabacus-8.2.9/AbacusT.c:2567:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer3, "Answer (divide by %d): %s", data/xabacus-8.2.9/AbacusT.c:2585:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer2, data/xabacus-8.2.9/AbacusT.c:2601:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer3, "Answer (divide by %d): %s", data/xabacus-8.2.9/AbacusT.c:2637:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer2, data/xabacus-8.2.9/AbacusT.c:2669:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer3, "Current answer (divide by %d): %s ", data/xabacus-8.2.9/AbacusT.c:2682:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer3, "Answer (divide by %d): %s", data/xabacus-8.2.9/AbacusT.c:2690:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer3, "Current answer (divide by %d): %s ", data/xabacus-8.2.9/AbacusT.c:2696:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer3, "Current answer (divide by %d): %s ", data/xabacus-8.2.9/AbacusT.c:2730:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer2, data/xabacus-8.2.9/AbacusT.c:2735:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer2, data/xabacus-8.2.9/AbacusT.c:2802:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer2, data/xabacus-8.2.9/AbacusT.c:2809:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer2, data/xabacus-8.2.9/AbacusT.c:2915:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer3, "(addition order will be: %s; multiplicand order will be %s)", data/xabacus-8.2.9/AbacusT.c:2985:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer1, data/xabacus-8.2.9/AbacusT.c:2992:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer1, "%sing %s %c %s", data/xabacus-8.2.9/AbacusT.c:3000:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(w->abacus.rString, w->abacus.aString); data/xabacus-8.2.9/AbacusT.c:3001:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer3, "%s %s", data/xabacus-8.2.9/AbacusT.c:3015:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer1, data/xabacus-8.2.9/AbacusT.c:3022:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer1, "Multiplying %s %c %s", data/xabacus-8.2.9/AbacusT.c:3035:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer3, "%s %s", data/xabacus-8.2.9/AbacusT.c:3049:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer1, data/xabacus-8.2.9/AbacusT.c:3057:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer1, "Division overflow %s / %s", data/xabacus-8.2.9/AbacusT.c:3064:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer1, "Dividing %s %c %s", data/xabacus-8.2.9/AbacusT.c:3076:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(w->abacus.rString, w->abacus.aString); data/xabacus-8.2.9/AbacusT.c:3078:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer3, "%s %s", data/xabacus-8.2.9/AbacusT.c:3084:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy (w->abacus.cString, w->abacus.aString); /* remainder */ data/xabacus-8.2.9/AbacusT.c:3096:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer1, "%s root of %s, grouping digits yields (%s)", data/xabacus-8.2.9/AbacusT.c:3107:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(w->abacus.rString, w->abacus.aString); data/xabacus-8.2.9/AbacusT.c:3109:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer3, "%s %s", data/xabacus-8.2.9/AbacusT.c:3160:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer1, "%sing %s %c %s", data/xabacus-8.2.9/AbacusT.c:3173:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer1, "Multiplying %s %c %s", data/xabacus-8.2.9/AbacusT.c:3192:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer1, "Dividing %s %c %s", data/xabacus-8.2.9/AbacusT.c:3238:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer1, "Taking %s Root of %s", data/xabacus-8.2.9/AbacusT.c:3340:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer3, "%s %s", data/xabacus-8.2.9/AbacusT.c:3365:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer3, "%s %s", data/xabacus-8.2.9/AbacusT.c:3406:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer3, "%s %s", data/xabacus-8.2.9/AbacusT.c:3410:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buffer3, "%s %s", data/xabacus-8.2.9/sound.c:54:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(progrun, data/xabacus-8.2.9/sound.c:60:7: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (system(progrun)) data/xabacus-8.2.9/sound.c:317:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(fullfile, data/xabacus-8.2.9/sound.c:505:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(file, data/xabacus-8.2.9/xabacus.c:881:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(szBuf, data/xabacus-8.2.9/xabacus.c:1943:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(titleDsp, data/xabacus-8.2.9/xabacus.c:3627:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(titleDsp, data/xabacus-8.2.9/xabacus.c:3800:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(titleDsp, data/xabacus-8.2.9/xabacus.c:3834:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(titleDsp, data/xabacus-8.2.9/xabacus.c:3865:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(titleDsp, data/xabacus-8.2.9/xabacus.c:3978:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(titleDsp, data/xabacus-8.2.9/xabacus.c:4011:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(titleDsp, data/xabacus-8.2.9/xwin.c:100:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(*string, "%s%d", var1, var2); data/xabacus-8.2.9/xwin.c:114:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(*string, "%s%s", var1, var2); data/xabacus-8.2.9/xwin.h:230:35: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define DISPLAY_WARNING(s) (void) fprintf(stderr, s) data/xabacus-8.2.9/rngs.h:16:15: [3] (random) lrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define LRAND lrand48 data/xabacus-8.2.9/rngs.h:19:15: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define SRAND srandom data/xabacus-8.2.9/rngs.h:20:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define LRAND random data/xabacus-8.2.9/rngs.h:23:15: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define SRAND srand data/xabacus-8.2.9/Abacus.c:1996:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[REG_BUFFER]; data/xabacus-8.2.9/Abacus.c:3982:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/xabacus-8.2.9/Abacus.c:3984:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(buf, "moveUp: corruption %d > %d.", data/xabacus-8.2.9/Abacus.c:4057:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/xabacus-8.2.9/Abacus.c:4059:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(buf, "moveDown: corruption %d > %d.", data/xabacus-8.2.9/Abacus.c:6462:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szBuf[STRING_SIZE]; data/xabacus-8.2.9/Abacus.c:6703:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/xabacus-8.2.9/Abacus.c:7303:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/xabacus-8.2.9/Abacus.c:7338:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/xabacus-8.2.9/Abacus.c:7340:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(buf, data/xabacus-8.2.9/Abacus.c:7375:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/xabacus-8.2.9/Abacus.c:7377:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(buf, data/xabacus-8.2.9/Abacus.c:7517:23: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((w->abacus.fp = fopen(SCRIPTFILE, "w")) == NULL) { data/xabacus-8.2.9/Abacus.c:7518:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/xabacus-8.2.9/AbacusC.c:241:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char variable[MAX_VALUE_LENGTH]; /* Hard code a limit for now */ data/xabacus-8.2.9/AbacusC.c:266:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char memoryBuf[CALC_STRING_SIZE]; data/xabacus-8.2.9/AbacusC.c:267:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char displayBuf[CALC_STRING_SIZE]; data/xabacus-8.2.9/AbacusC.c:268:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char stringBuf[CALC_STRING_SIZE]; data/xabacus-8.2.9/AbacusC.c:395:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_VALUE_LENGTH]; data/xabacus-8.2.9/AbacusC.c:440:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_VALUE_LENGTH]; data/xabacus-8.2.9/AbacusC.c:453:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(string, data/xabacus-8.2.9/AbacusC.c:507:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char floatString[MAX_VALUE_LENGTH]; data/xabacus-8.2.9/AbacusC.c:1245:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char numberString[CALC_STRING_SIZE]; data/xabacus-8.2.9/AbacusD.c:264:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/xabacus-8.2.9/AbacusD.c:305:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *introFramelessText[LINES] = data/xabacus-8.2.9/AbacusD.c:313:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *introFramedText[LINES] = data/xabacus-8.2.9/AbacusD.c:321:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *bookText[LINES] = data/xabacus-8.2.9/AbacusD.c:329:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *chapterText[LINES] = data/xabacus-8.2.9/AbacusD.c:337:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *queryText[LINES] = data/xabacus-8.2.9/AbacusD.c:345:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *conclLesson[LINES] = data/xabacus-8.2.9/AbacusD.c:356:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char displayText[LINES][CHARS] = {"", "", "", ""}; data/xabacus-8.2.9/AbacusD.c:557:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/xabacus-8.2.9/AbacusD.c:587:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/xabacus-8.2.9/AbacusF.c:26:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *bookTextFallback[1][LINES] = data/xabacus-8.2.9/AbacusF.c:36:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *chapterTextFallback[1][5][LINES] = data/xabacus-8.2.9/AbacusF.c:170:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *lessonTextFallback[1][4][5][2][41][LINES + 1] = data/xabacus-8.2.9/AbacusM.c:334:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(buf, data/xabacus-8.2.9/AbacusM.c:495:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fltbuf[STRING_SIZE]; data/xabacus-8.2.9/AbacusM.c:761:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fractbuf[MAX_ROMANFRACT] = ""; data/xabacus-8.2.9/AbacusP.h:206:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char museum[MAX_MUSEUMS]; /* 2 char country code of museum */ data/xabacus-8.2.9/AbacusP.h:270:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format[STRING_SIZE], museum[COUNTRY_SIZE]; data/xabacus-8.2.9/AbacusP.h:271:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bumpSound[STRING_SIZE], moveSound[STRING_SIZE], dripSound[STRING_SIZE]; data/xabacus-8.2.9/AbacusP.h:272:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char aString[STRING_SIZE], bString[STRING_SIZE]; data/xabacus-8.2.9/AbacusP.h:273:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cString[STRING_SIZE], rString[STRING_SIZE]; data/xabacus-8.2.9/AbacusP.h:274:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sString[STRING_SIZE]; data/xabacus-8.2.9/AbacusP.h:275:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char helperBuffer[STRING_SIZE]; data/xabacus-8.2.9/AbacusP.h:299:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[STRING_SIZE]; data/xabacus-8.2.9/AbacusP.h:357:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char *bookTextFallback[1][LINES]; data/xabacus-8.2.9/AbacusP.h:358:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char *chapterTextFallback[1][5][LINES]; data/xabacus-8.2.9/AbacusP.h:359:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char *lessonTextFallback[1][4][5][2][41][LINES + 1]; data/xabacus-8.2.9/AbacusT.c:780:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char my[512], yours[512]; data/xabacus-8.2.9/AbacusT.c:795:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pre[2]; data/xabacus-8.2.9/AbacusT.c:857:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[512]; data/xabacus-8.2.9/AbacusT.c:1157:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newString[512]; data/xabacus-8.2.9/AbacusT.c:1493:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer3[CALC_STRING_SIZE] = ""; data/xabacus-8.2.9/AbacusT.c:1515:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[CALC_STRING_SIZE]; data/xabacus-8.2.9/AbacusT.c:1555:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(buffer, "For rail %d", position); data/xabacus-8.2.9/AbacusT.c:1902:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(w->abacus.cString, "%d", power); data/xabacus-8.2.9/AbacusT.c:1985:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(w->abacus.bString, "%d", power); data/xabacus-8.2.9/AbacusT.c:2056:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[CALC_STRING_SIZE] = ""; data/xabacus-8.2.9/AbacusT.c:2106:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[CALC_STRING_SIZE] = ""; data/xabacus-8.2.9/AbacusT.c:2144:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer1[CALC_STRING_SIZE] = ""; data/xabacus-8.2.9/AbacusT.c:2145:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer2[CALC_STRING_SIZE] = ""; data/xabacus-8.2.9/AbacusT.c:2146:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer3[CALC_STRING_SIZE] = ""; data/xabacus-8.2.9/AbacusT.c:2218:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(w->abacus.bString, "%d.", sub); data/xabacus-8.2.9/AbacusT.c:2353:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void) strcpy(buffer2, "And clear primary"); data/xabacus-8.2.9/AbacusT.c:2355:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void) strcpy(w->abacus.aString, "0."); data/xabacus-8.2.9/AbacusT.c:2356:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void) strcpy(w->abacus.bString, "0."); data/xabacus-8.2.9/AbacusT.c:2371:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void) strcpy(w->abacus.bString, ".5"); data/xabacus-8.2.9/AbacusT.c:2384:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[CALC_STRING_SIZE]; data/xabacus-8.2.9/AbacusT.c:2505:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer2[CALC_STRING_SIZE] = ""; data/xabacus-8.2.9/AbacusT.c:2506:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer3[CALC_STRING_SIZE] = ""; data/xabacus-8.2.9/AbacusT.c:2596:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(buffer2, "Yes, ok to iterate"); data/xabacus-8.2.9/AbacusT.c:2633:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(buffer2, data/xabacus-8.2.9/AbacusT.c:2862:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer1[CALC_STRING_SIZE] = ""; data/xabacus-8.2.9/AbacusT.c:2863:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer2[CALC_STRING_SIZE] = ""; data/xabacus-8.2.9/AbacusT.c:2864:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer3[CALC_STRING_SIZE] = ""; data/xabacus-8.2.9/AbacusT.c:3177:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[CALC_STRING_SIZE]; data/xabacus-8.2.9/AbacusT.c:3196:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[CALC_STRING_SIZE]; data/xabacus-8.2.9/AbacusT.c:3439:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[CALC_STRING_SIZE] = ""; data/xabacus-8.2.9/AbacusT.c:3459:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(buffer, "%1.*f%c", places * root, data/xabacus-8.2.9/AbacusT.c:3507:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(buffer, "%d%c%d", x, op, y); data/xabacus-8.2.9/file.c:30:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirname[256]; data/xabacus-8.2.9/file.c:41:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(fileName, type)) == NULL) data/xabacus-8.2.9/sound.c:143:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[2048]; data/xabacus-8.2.9/sound.c:154:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = open(fileName, O_RDONLY, 0777); /* Open the file */ data/xabacus-8.2.9/sound.c:259:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. union { int i; char c[sizeof(int)]; } u; data/xabacus-8.2.9/sound.c:290:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullfile[MAXPATHLEN]; data/xabacus-8.2.9/vms/vms_amd.c:19:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ReadBuffer[512]; /* Asynchronous read buffer */ data/xabacus-8.2.9/vms/vms_mmov.c:33:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char extra_data[ NUM_DATA ]; data/xabacus-8.2.9/xabacus.c:654:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char descriptionHelp[DESCRIPTION_SIZE]; data/xabacus-8.2.9/xabacus.c:719:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char calc[CALC_STRING_SIZE] = ""; data/xabacus-8.2.9/xabacus.c:872:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szBuf[MAX_DIGITS_DISPLAY]; data/xabacus-8.2.9/xabacus.c:908:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[CALC_STRING_SIZE]; data/xabacus-8.2.9/xabacus.c:940:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mathBuff[CALC_STRING_SIZE]; data/xabacus-8.2.9/xabacus.c:976:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[CALC_STRING_SIZE]; data/xabacus-8.2.9/xabacus.c:1784:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char titleDsp[TITLE_LENGTH]; data/xabacus-8.2.9/xabacus.c:1787:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char titleDspDemo[TITLE_DEMO_LENGTH]; data/xabacus-8.2.9/xabacus.c:3620:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char titleDsp[TITLE_FILE_LENGTH]; data/xabacus-8.2.9/xabacus.c:3790:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char titleDsp[TITLE_FILE_LENGTH]; data/xabacus-8.2.9/xabacus.c:3822:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char titleDsp[TITLE_FILE_LENGTH]; data/xabacus-8.2.9/xabacus.c:3858:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char titleDsp[TITLE_FILE_LENGTH]; data/xabacus-8.2.9/xabacus.c:3968:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char titleDsp[TITLE_FILE_LENGTH]; data/xabacus-8.2.9/xabacus.c:4004:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char titleDsp[TITLE_FILE_LENGTH]; data/xabacus-8.2.9/xabacus.c:4141:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char optionsHelp[OPTIONS_SIZE]; data/xabacus-8.2.9/xabacus.c:4682:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. XmStringCreateSimple((char *) formatChoices[i]); data/xabacus-8.2.9/xabacus.c:4690:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (char *) formatChoices[i], args, 2); data/xabacus-8.2.9/xwin.c:124:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(string, "%d", var); data/xabacus-8.2.9/Abacus.c:632:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char * p = calloc((unsigned int) strlen(text) + 1, sizeof(*text)); data/xabacus-8.2.9/Abacus.c:1892:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(buffer, finalBuf, (unsigned int) (w->abacus.numDigits + 1)); data/xabacus-8.2.9/Abacus.c:1943:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(buffer, finalBuf, (unsigned int) (w->abacus.numDigits + 1)); data/xabacus-8.2.9/Abacus.c:1966:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (strlen(buffer) > 3 && data/xabacus-8.2.9/Abacus.c:1967:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buffer[strlen(buffer) - 1] == '0' && data/xabacus-8.2.9/Abacus.c:1968:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buffer[strlen(buffer) - 2] != decimalChar(w)) { data/xabacus-8.2.9/Abacus.c:1969:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buffer[strlen(buffer) - 1] = '\0'; data/xabacus-8.2.9/Abacus.c:1971:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (buffer[strlen(buffer) - 1] == '.') { data/xabacus-8.2.9/Abacus.c:1972:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buffer[strlen(buffer) - 1] = '\0'; data/xabacus-8.2.9/Abacus.c:2016:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(buffer, buff, REG_BUFFER); data/xabacus-8.2.9/Abacus.c:2022:10: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer, " ", 3); data/xabacus-8.2.9/Abacus.c:2044:10: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. (void) strncat(buffer, romanString, (unsigned int) romanSize); data/xabacus-8.2.9/Abacus.c:2051:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). 3 * strlen(buffer) / 2))) { data/xabacus-8.2.9/Abacus.c:5289:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = 0; i < (int) strlen(expression) - CARRY; i++) { data/xabacus-8.2.9/Abacus.c:6039:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nDigits = strlen(w->abacus.digits) + 1; data/xabacus-8.2.9/Abacus.c:6062:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(buffer, w->abacus.digits, nDigits); data/xabacus-8.2.9/Abacus.c:6518:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(w->abacus.format, szBuf, STRING_SIZE - 1); data/xabacus-8.2.9/Abacus.c:6522:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(w->abacus.museum, szBuf, 2); data/xabacus-8.2.9/Abacus.c:6665:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(w->abacus.bumpSound, szBuf, STRING_SIZE - 1); data/xabacus-8.2.9/Abacus.c:6669:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(w->abacus.moveSound, szBuf, STRING_SIZE - 1); data/xabacus-8.2.9/Abacus.c:6673:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(w->abacus.dripSound, szBuf, STRING_SIZE - 1); data/xabacus-8.2.9/Abacus.c:6693:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(w->abacusDemo.path, szBuf, STRING_SIZE - 1); data/xabacus-8.2.9/AbacusC.c:547:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = (int) strlen(string); data/xabacus-8.2.9/AbacusC.c:1018:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(displayBuf, memoryBuf, CALC_STRING_SIZE); /* update display */ data/xabacus-8.2.9/AbacusC.c:1101:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int digit, factor, i, sign = 0, len = (int) strlen(string); data/xabacus-8.2.9/AbacusC.c:1209:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = 0; i < strlen(buf); i++) { data/xabacus-8.2.9/AbacusC.c:1222:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s = s + strlen(buf); /* the position to write */ data/xabacus-8.2.9/AbacusC.c:1234:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s = s + strlen(buf); /* the position to write */ data/xabacus-8.2.9/AbacusC.c:1287:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(stringBuf, buffer, CALC_STRING_SIZE - 1); data/xabacus-8.2.9/AbacusC.c:1291:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = 0; i < strlen(stringBuf); i++) { data/xabacus-8.2.9/AbacusD.c:477:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). line, (signed) strlen(line)); data/xabacus-8.2.9/AbacusD.c:486:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). line, strlen(line)); data/xabacus-8.2.9/AbacusD.c:667:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(displayText[line], tmp, CHARS - 1); data/xabacus-8.2.9/AbacusE.c:207:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (((unsigned int) (end - ptr + 1)) < strlen(str)) data/xabacus-8.2.9/AbacusE.c:268:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t valueLength = strlen((char *) value) + 1; data/xabacus-8.2.9/AbacusE.c:394:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t valueLength = strlen((char *) value) + 1; data/xabacus-8.2.9/AbacusE.c:422:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). textLength = strlen(text[i]) + 1; data/xabacus-8.2.9/AbacusE.c:425:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(moveAbacus->lineText[i], text[i], textLength); data/xabacus-8.2.9/AbacusE.c:446:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nameLength = strlen((char *) name) + 1; data/xabacus-8.2.9/AbacusE.c:454:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(lessonAbacus->name, (char *) name, nameLength); data/xabacus-8.2.9/AbacusE.c:480:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nameLength = strlen((char *) name) + 1; data/xabacus-8.2.9/AbacusE.c:488:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(chapterAbacus->name, (char *) name, nameLength); data/xabacus-8.2.9/AbacusE.c:514:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t versionLength = strlen((char *) version) + 1; data/xabacus-8.2.9/AbacusE.c:522:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(editionAbacus->version, (char *) version, versionLength); data/xabacus-8.2.9/AbacusE.c:549:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nameLength = strlen((char *) name) + 1; data/xabacus-8.2.9/AbacusE.c:550:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t authorLength = strlen((char *) author) + 1; data/xabacus-8.2.9/AbacusE.c:559:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(bookAbacus->name, (char *) name, nameLength); data/xabacus-8.2.9/AbacusE.c:562:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(bookAbacus->author, (char *) author, authorLength); data/xabacus-8.2.9/AbacusM.c:244:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). last = (int) strlen(buf); data/xabacus-8.2.9/AbacusM.c:354:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int size = (int) strlen(aBuf); data/xabacus-8.2.9/AbacusM.c:398:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int aEnd = (int) strlen(aBuf), bEnd = (int) strlen(bBuf); /* zeros included */ data/xabacus-8.2.9/AbacusM.c:398:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int aEnd = (int) strlen(aBuf), bEnd = (int) strlen(bBuf); /* zeros included */ data/xabacus-8.2.9/AbacusM.c:452:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(&buf[aSign + 1], &aBuf[aSign], (unsigned int) (aEnd - aSign + 1)); data/xabacus-8.2.9/AbacusM.c:454:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(buf, aBuf, (unsigned int) (aEnd + 1)); data/xabacus-8.2.9/AbacusM.c:475:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(&buf[bSign + 1], &bBuf[bSign], (unsigned int) (bEnd - bSign + 1)); data/xabacus-8.2.9/AbacusM.c:477:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(buf, bBuf, (unsigned int) (bEnd + 1)); data/xabacus-8.2.9/AbacusM.c:479:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = (int) strlen(buf) - 1; data/xabacus-8.2.9/AbacusM.c:503:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). last = (int) strlen(inbuf); data/xabacus-8.2.9/AbacusM.c:590:9: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. (void) strncat(buf, ".", 2); data/xabacus-8.2.9/AbacusM.c:644:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. (void) strncat(buf, " ", 2); data/xabacus-8.2.9/AbacusM.c:654:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. (void) strncat(buf, " ", 2); data/xabacus-8.2.9/AbacusM.c:674:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return (int) strlen(oldRoman[place]); data/xabacus-8.2.9/AbacusM.c:699:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). last = (int) strlen(inbuf); data/xabacus-8.2.9/AbacusM.c:765:11: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. (void) strncat(buf, " ", 2); data/xabacus-8.2.9/AbacusM.c:770:9: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. (void) strncat(buf, "]", 2); data/xabacus-8.2.9/AbacusM.c:833:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int max = (int) strlen(inbuf); data/xabacus-8.2.9/AbacusM.c:855:9: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. (void) strncat(buf, &inbuf[len - 1], (unsigned int) max); data/xabacus-8.2.9/AbacusT.c:83:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = 0; i < strlen(buffer); i++) { data/xabacus-8.2.9/AbacusT.c:106:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. (void) strncat(aString, ".", 2); data/xabacus-8.2.9/AbacusT.c:108:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. (void) strncat(bString, ".", 2); data/xabacus-8.2.9/AbacusT.c:113:14: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. (void) strncat(aString, "-", 2); data/xabacus-8.2.9/AbacusT.c:117:14: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. (void) strncat(bString, "-", 2); data/xabacus-8.2.9/AbacusT.c:467:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). line, (signed) strlen(line)); data/xabacus-8.2.9/AbacusT.c:530:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (decimal == (int) strlen(string)) { data/xabacus-8.2.9/AbacusT.c:531:10: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. (void) strncat(string, ".", 2); data/xabacus-8.2.9/AbacusT.c:540:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (i == (int) strlen(string) || i >= pos) data/xabacus-8.2.9/AbacusT.c:597:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int i, length = (int) strlen(string); data/xabacus-8.2.9/AbacusT.c:609:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = (int) strlen(string); data/xabacus-8.2.9/AbacusT.c:617:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = (int) strlen(string); data/xabacus-8.2.9/AbacusT.c:632:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). last = (int) strlen(string) - 1; data/xabacus-8.2.9/AbacusT.c:640:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = 0; i < (int) strlen(string); i++) { data/xabacus-8.2.9/AbacusT.c:647:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = 0; i < (int) strlen(string); i++) data/xabacus-8.2.9/AbacusT.c:659:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = (int) strlen(string); data/xabacus-8.2.9/AbacusT.c:672:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = (int) strlen(string); data/xabacus-8.2.9/AbacusT.c:686:60: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (void) printf("stripStringBuffer: %s %d\n", string, (int) strlen(string)); data/xabacus-8.2.9/AbacusT.c:696:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int appendOffset = offset + 1 - (int) strlen(string) - place; data/xabacus-8.2.9/AbacusT.c:700:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = (int) strlen(string); data/xabacus-8.2.9/AbacusT.c:722:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = (int) strlen(string); data/xabacus-8.2.9/AbacusT.c:727:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = (int) strlen(string); data/xabacus-8.2.9/AbacusT.c:734:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (((int) strlen(string)) > 1 && data/xabacus-8.2.9/AbacusT.c:736:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = (int) strlen(string); data/xabacus-8.2.9/AbacusT.c:743:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (string[0] == '0' && ((int) strlen(string)) == 1) { data/xabacus-8.2.9/AbacusT.c:749:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = (int) strlen(string); data/xabacus-8.2.9/AbacusT.c:755:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = (int) strlen(string); data/xabacus-8.2.9/AbacusT.c:761:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (newOffset >= (int) strlen(string)) { data/xabacus-8.2.9/AbacusT.c:762:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = (int) strlen(string); data/xabacus-8.2.9/AbacusT.c:770:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = (int) strlen(string); i >= newOffset; i--) { data/xabacus-8.2.9/AbacusT.c:785:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(yours, my, 512); data/xabacus-8.2.9/AbacusT.c:803:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(temp, group, (unsigned int) intGroupSize); data/xabacus-8.2.9/AbacusT.c:864:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). aCount = (int) strlen(aString) - aDecimal; data/xabacus-8.2.9/AbacusT.c:865:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bCount = (int) strlen(bString) - bDecimal; data/xabacus-8.2.9/AbacusT.c:869:11: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. (void) strncat(bString, "0", 2); data/xabacus-8.2.9/AbacusT.c:872:11: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. (void) strncat(aString, "0", 2); data/xabacus-8.2.9/AbacusT.c:895:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int count = (int) strlen(string) - 1; data/xabacus-8.2.9/AbacusT.c:896:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int decimalPosition = (int) strlen(string) - 1 - data/xabacus-8.2.9/AbacusT.c:900:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((int) strlen(string) == getDecimalStringPosition(string)) data/xabacus-8.2.9/AbacusT.c:901:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). count = (int) strlen(string); /* no decimal point */ data/xabacus-8.2.9/AbacusT.c:932:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (pos < 0 || pos >= (int) strlen(string)) { data/xabacus-8.2.9/AbacusT.c:961:59: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int runover = decimalOffsetString(string, place) - (int) strlen(string); data/xabacus-8.2.9/AbacusT.c:966:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = 0; i < (int) strlen(string); i++) { data/xabacus-8.2.9/AbacusT.c:987:59: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int runover = decimalOffsetString(string, place) - (int) strlen(string); data/xabacus-8.2.9/AbacusT.c:994:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = 0; i < (int) strlen(string); i++) { data/xabacus-8.2.9/AbacusT.c:1001:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (j = 0; j < (int) strlen(string); j++) { data/xabacus-8.2.9/AbacusT.c:1088:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return (int) strlen(string) - 1; data/xabacus-8.2.9/AbacusT.c:1095:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return ((int) strlen(aString) - 1) * ((int) strlen(bString) - 1); data/xabacus-8.2.9/AbacusT.c:1095:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return ((int) strlen(aString) - 1) * ((int) strlen(bString) - 1); data/xabacus-8.2.9/AbacusT.c:1113:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(aString) == 0 || strlen(bString) == 0) data/xabacus-8.2.9/AbacusT.c:1113:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(aString) == 0 || strlen(bString) == 0) data/xabacus-8.2.9/AbacusT.c:1144:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ((int) strlen(bString) - 1); data/xabacus-8.2.9/AbacusT.c:1159:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(string) == 0) data/xabacus-8.2.9/AbacusT.c:1170:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(string) == 0) data/xabacus-8.2.9/AbacusT.c:1179:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = (int) strlen(string); data/xabacus-8.2.9/AbacusT.c:1518:9: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, " ... ", 6); data/xabacus-8.2.9/AbacusT.c:1525:9: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. (void) strncat(buffer1, " ", 2); data/xabacus-8.2.9/AbacusT.c:1527:9: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. (void) strncat(buffer1, " ", 2); data/xabacus-8.2.9/AbacusT.c:1538:9: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, " = ", 4); data/xabacus-8.2.9/AbacusT.c:1558:10: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer, " do nothing", 12); data/xabacus-8.2.9/AbacusT.c:1565:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer, ", take off ", 12); data/xabacus-8.2.9/AbacusT.c:1567:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer, ", put on ", 10); data/xabacus-8.2.9/AbacusT.c:1571:13: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer, " from lower deck", 17); data/xabacus-8.2.9/AbacusT.c:1573:13: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer, " to lower deck", 15); data/xabacus-8.2.9/AbacusT.c:1578:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer, ", take off ", 12); data/xabacus-8.2.9/AbacusT.c:1580:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer, ", put on ", 10); data/xabacus-8.2.9/AbacusT.c:1583:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer, " from upper deck", 17); data/xabacus-8.2.9/AbacusT.c:1585:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer, " to upper deck", 15); data/xabacus-8.2.9/AbacusT.c:1589:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer, ", carry ", 9); data/xabacus-8.2.9/AbacusT.c:1591:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer, ", borrow ", 10); data/xabacus-8.2.9/AbacusT.c:1593:11: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer, " (on next move)", 16); data/xabacus-8.2.9/AbacusT.c:1597:9: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer, ". ", 3); data/xabacus-8.2.9/AbacusT.c:1713:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int bCount = (int) strlen(w->abacus.bString) - 1; data/xabacus-8.2.9/AbacusT.c:1778:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int bCount = (int) strlen(w->abacus.bString) - 1; data/xabacus-8.2.9/AbacusT.c:2163:10: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, " ... ", 6); data/xabacus-8.2.9/AbacusT.c:2166:11: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, " * ", 4); data/xabacus-8.2.9/AbacusT.c:2169:10: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, " * ", 4); data/xabacus-8.2.9/AbacusT.c:2171:10: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, " = ", 4); data/xabacus-8.2.9/AbacusT.c:2182:11: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, ", register ", 12); data/xabacus-8.2.9/AbacusT.c:2184:11: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, " on first auxiliary, rail ", 27); data/xabacus-8.2.9/AbacusT.c:2246:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, " ... carrying 1", 16); data/xabacus-8.2.9/AbacusT.c:2388:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, ", adding ", 10); data/xabacus-8.2.9/AbacusT.c:2392:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, " ... carrying 1", 16); data/xabacus-8.2.9/AbacusT.c:2570:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. (void) strncpy(buffer2, "Done", 5); data/xabacus-8.2.9/AbacusT.c:2576:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. (void) strncpy(buffer2, "Now try smaller value", 22); data/xabacus-8.2.9/AbacusT.c:2579:12: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. (void) strncpy(buffer2, data/xabacus-8.2.9/AbacusT.c:2604:12: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. (void) strncpy(buffer2, "Done", 5); data/xabacus-8.2.9/AbacusT.c:2610:12: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. (void) strncpy(buffer2, "Try smaller value", 18); data/xabacus-8.2.9/AbacusT.c:2727:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. (void) strncpy(buffer2, "Carrying in right A-O field", 28); data/xabacus-8.2.9/AbacusT.c:2799:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. (void) strncpy(buffer2, "Borrowing", 10); data/xabacus-8.2.9/AbacusT.c:3007:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(w->abacus.aString) == 0) data/xabacus-8.2.9/AbacusT.c:3027:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, data/xabacus-8.2.9/AbacusT.c:3034:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. (void) strncpy(w->abacus.rString, "0.", 3); data/xabacus-8.2.9/AbacusT.c:3041:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(w->abacus.aString) == 0) data/xabacus-8.2.9/AbacusT.c:3069:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, data/xabacus-8.2.9/AbacusT.c:3077:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. (void) strncpy(w->abacus.sString, "0.", 3); data/xabacus-8.2.9/AbacusT.c:3102:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, data/xabacus-8.2.9/AbacusT.c:3108:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. (void) strncpy(w->abacus.sString, "0.", 3); data/xabacus-8.2.9/AbacusT.c:3114:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. (void) strncpy(w->abacus.bString, "0.", 3); data/xabacus-8.2.9/AbacusT.c:3115:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. (void) strncpy(w->abacus.cString, "0.", 3); data/xabacus-8.2.9/AbacusT.c:3167:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, " ... carrying 1", 16); data/xabacus-8.2.9/AbacusT.c:3181:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, ", adding ", 10); data/xabacus-8.2.9/AbacusT.c:3185:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, " ... carrying 1", 16); data/xabacus-8.2.9/AbacusT.c:3210:13: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, ", register ", 12); data/xabacus-8.2.9/AbacusT.c:3213:13: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, " on second auxiliary, rail ", 28); data/xabacus-8.2.9/AbacusT.c:3226:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, ", subtracting ", 15); data/xabacus-8.2.9/AbacusT.c:3231:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, " ... borrowing 1", 17); data/xabacus-8.2.9/AbacusT.c:3242:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, " ... ", 6); data/xabacus-8.2.9/AbacusT.c:3245:13: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, " * ", 4); data/xabacus-8.2.9/AbacusT.c:3248:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, " * ", 4); data/xabacus-8.2.9/AbacusT.c:3250:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, " = ", 4); data/xabacus-8.2.9/AbacusT.c:3261:13: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, ", register ", 12); data/xabacus-8.2.9/AbacusT.c:3263:13: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, " on first auxiliary, rail ", 27); data/xabacus-8.2.9/AbacusT.c:3271:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, " ... subtracting ", 18); data/xabacus-8.2.9/AbacusT.c:3275:12: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(buffer1, " ... borrowing 1", 17); data/xabacus-8.2.9/AbacusU.c:185:15: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((c = getc(fp)) != EOF && c != SYMBOL); data/xabacus-8.2.9/file.c:66:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = (int) strlen(fileName); i >= 0; i--) { data/xabacus-8.2.9/sound.c:47:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). unsigned int callLength = strlen(DEF_PLAY) + strlen(fileName) + 11; data/xabacus-8.2.9/sound.c:47:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). unsigned int callLength = strlen(DEF_PLAY) + strlen(fileName) + 11; data/xabacus-8.2.9/sound.c:157:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). i = read(fp, buffer, 2048); data/xabacus-8.2.9/sound.c:162:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). i = read(fp, buffer, 1024); data/xabacus-8.2.9/sound.c:497:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t callLength = strlen(SOUNDPATH) + strlen(FINALDELIM) + data/xabacus-8.2.9/sound.c:497:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t callLength = strlen(SOUNDPATH) + strlen(FINALDELIM) + data/xabacus-8.2.9/sound.c:498:3: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(fileName) + strlen(SOUNDEXT) + 1; data/xabacus-8.2.9/sound.c:498:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(fileName) + strlen(SOUNDEXT) + 1; data/xabacus-8.2.9/timer.c:49:1: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(unsigned int usec) data/xabacus-8.2.9/timer.c:107:9: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. (void) usleep(cMilliseconds * 1000); data/xabacus-8.2.9/timer.c:135:10: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. (void) usleep((unsigned int) sleepTime); data/xabacus-8.2.9/vms/vms_amd.c:42:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). devname.dsc$w_length = strlen(device); data/xabacus-8.2.9/xabacus.c:869:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(calc, string, CALC_STRING_SIZE - 1); data/xabacus-8.2.9/xabacus.c:947:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = 0; i < (int) strlen(mathBuff); i++) { data/xabacus-8.2.9/xabacus.c:1584:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(descriptionHelp, description1Help, DESCRIPTION1_SIZE); data/xabacus-8.2.9/xabacus.c:1585:4: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. strncat(descriptionHelp, "\n", 2); data/xabacus-8.2.9/xabacus.c:1797:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = 0; i < strlen(synopsisHelp); i++) { data/xabacus-8.2.9/xabacus.c:2306:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(titleDspDemo, progDsp, TITLE_DEMO_LENGTH - 6); data/xabacus-8.2.9/xabacus.c:2308:9: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(titleDspDemo, "-demo", 6); data/xabacus-8.2.9/xabacus.c:2322:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(titleDspDemo, progDsp, FILE_NAME_LENGTH - 6); data/xabacus-8.2.9/xabacus.c:2324:9: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. (void) strncat(titleDspDemo, "-demo", 6); data/xabacus-8.2.9/xabacus.c:2363:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (str != NULL && strlen((char *) str) > 0) data/xabacus-8.2.9/xabacus.c:3114:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = 0; i < strlen(mathBuffer); i++) { data/xabacus-8.2.9/xabacus.c:4624:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(descriptionHelp, description1Help, DESCRIPTION1_SIZE); data/xabacus-8.2.9/xabacus.c:4625:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. strncat(descriptionHelp, "\n", 2); data/xabacus-8.2.9/xabacus.c:4633:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(optionsHelp, options1Help, OPTIONS1_SIZE); data/xabacus-8.2.9/xabacus.c:4634:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. strncat(optionsHelp, "\n", 2); data/xabacus-8.2.9/xabacus.c:4636:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. strncat(optionsHelp, "\n", 2); data/xabacus-8.2.9/xabacus.c:4638:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. strncat(optionsHelp, "\n", 2); data/xabacus-8.2.9/xwin.c:93:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t stringSize = strlen(var1) + 21; data/xabacus-8.2.9/xwin.c:107:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t stringSize = strlen(var1) + strlen(var2) + 1; data/xabacus-8.2.9/xwin.c:107:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t stringSize = strlen(var1) + strlen(var2) + 1; ANALYSIS SUMMARY: Hits = 445 Lines analyzed = 28088 in approximately 0.76 seconds (36948 lines/second) Physical Source Lines of Code (SLOC) = 25329 Hits@level = [0] 257 [1] 216 [2] 108 [3] 4 [4] 92 [5] 25 Hits@level+ = [0+] 702 [1+] 445 [2+] 229 [3+] 121 [4+] 117 [5+] 25 Hits/KSLOC@level+ = [0+] 27.7153 [1+] 17.5688 [2+] 9.04102 [3+] 4.77713 [4+] 4.61921 [5+] 0.987011 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.