Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/xfractint-20.4.10/extra/tru.c
Examining data/xfractint-20.4.10/unix/xfcurses.c
Examining data/xfractint-20.4.10/unix/fracsuba.c
Examining data/xfractint-20.4.10/unix/general.c
Examining data/xfractint-20.4.10/unix/diskvidu.c
Examining data/xfractint-20.4.10/unix/fpu087.c
Examining data/xfractint-20.4.10/unix/calcmand.c
Examining data/xfractint-20.4.10/unix/calmanfp.c
Examining data/xfractint-20.4.10/unix/video.c
Examining data/xfractint-20.4.10/unix/unixscr.c
Examining data/xfractint-20.4.10/unix/unix.c
Examining data/xfractint-20.4.10/headers/dosprot.h
Examining data/xfractint-20.4.10/headers/xfcurses.h
Examining data/xfractint-20.4.10/headers/port.h
Examining data/xfractint-20.4.10/headers/fractint.h
Examining data/xfractint-20.4.10/headers/fmath.h
Examining data/xfractint-20.4.10/headers/MATHTOOL.H
Examining data/xfractint-20.4.10/headers/SELECT.H
Examining data/xfractint-20.4.10/headers/lsys.h
Examining data/xfractint-20.4.10/headers/targa_lc.h
Examining data/xfractint-20.4.10/headers/cmplx.h
Examining data/xfractint-20.4.10/headers/targa.h
Examining data/xfractint-20.4.10/headers/WINFRACT.H
Examining data/xfractint-20.4.10/headers/tplus.h
Examining data/xfractint-20.4.10/headers/big.h
Examining data/xfractint-20.4.10/headers/helpcom.h
Examining data/xfractint-20.4.10/headers/fractype.h
Examining data/xfractint-20.4.10/headers/biginit.h
Examining data/xfractint-20.4.10/headers/externs.h
Examining data/xfractint-20.4.10/headers/winprot.h
Examining data/xfractint-20.4.10/headers/unixprot.h
Examining data/xfractint-20.4.10/headers/uclock.h
Examining data/xfractint-20.4.10/headers/PROFILE.H
Examining data/xfractint-20.4.10/headers/unix.h
Examining data/xfractint-20.4.10/headers/DIALOG.H
Examining data/xfractint-20.4.10/headers/prototyp.h
Examining data/xfractint-20.4.10/headers/mpmath.h
Examining data/xfractint-20.4.10/common/lsysf.c
Examining data/xfractint-20.4.10/common/hcmplx.c
Examining data/xfractint-20.4.10/common/f16.c
Examining data/xfractint-20.4.10/common/ant.c
Examining data/xfractint-20.4.10/common/testpt.c
Examining data/xfractint-20.4.10/common/soi.c
Examining data/xfractint-20.4.10/common/line3d.c
Parsing failed to find end of parameter list; semicolon terminated it in (File_Ptr1, "  %Fs"
                 "      %Fs%Fs% #4.4f %Fs% #4.4f %Fs% #4.4f\n"
                 "%Fs"
                 " %Fs%Fs",
#else
         fprintf(File_Ptr1,
                 "  %s   %s%s% #
Parsing failed to find end of parameter list; semicolon terminated it in (File_Ptr1, "  %Fs%Fs  %Fs%Fs",
#else
      fprintf(File_Ptr1, "  %s%s  %s%s",
#endif
              (char far *)s_color, (char far *)frac_default,
              (char far *)end, (char far *)object);
 
Examining data/xfractint-20.4.10/common/fractalb.c
Examining data/xfractint-20.4.10/common/loadfdos.c
Examining data/xfractint-20.4.10/common/yourvid.c
Examining data/xfractint-20.4.10/common/parserfp.c
Examining data/xfractint-20.4.10/common/editpal.c
Examining data/xfractint-20.4.10/common/fracsubr.c
Examining data/xfractint-20.4.10/common/bigflt.c
Examining data/xfractint-20.4.10/common/plot3d.c
Examining data/xfractint-20.4.10/common/calcfrac.c
Examining data/xfractint-20.4.10/common/jb.c
Examining data/xfractint-20.4.10/common/printer.c
Examining data/xfractint-20.4.10/common/fractint.c
Examining data/xfractint-20.4.10/common/mpmath_c.c
Examining data/xfractint-20.4.10/common/memory.c
Examining data/xfractint-20.4.10/common/help.c
Examining data/xfractint-20.4.10/common/targa.c
Examining data/xfractint-20.4.10/common/miscres.c
Examining data/xfractint-20.4.10/common/diskvid.c
Examining data/xfractint-20.4.10/common/miscfrac.c
Examining data/xfractint-20.4.10/common/rotate.c
Examining data/xfractint-20.4.10/common/3d.c
Examining data/xfractint-20.4.10/common/loadmap.c
Examining data/xfractint-20.4.10/common/realdos.c
Examining data/xfractint-20.4.10/common/fractals.c
Examining data/xfractint-20.4.10/common/lsys.c
Examining data/xfractint-20.4.10/common/soi1.c
Examining data/xfractint-20.4.10/common/evolve.c
Examining data/xfractint-20.4.10/common/decoder.c
Examining data/xfractint-20.4.10/common/parser.c
Examining data/xfractint-20.4.10/common/zoom.c
Examining data/xfractint-20.4.10/common/prompts1.c
Examining data/xfractint-20.4.10/common/encoder.c
Examining data/xfractint-20.4.10/common/lorenz.c
Examining data/xfractint-20.4.10/common/slideshw.c
Examining data/xfractint-20.4.10/common/miscovl.c
Examining data/xfractint-20.4.10/common/loadfile.c
Examining data/xfractint-20.4.10/common/cmdfiles.c
Examining data/xfractint-20.4.10/common/frasetup.c
Examining data/xfractint-20.4.10/common/bignum.c
Examining data/xfractint-20.4.10/common/jiim.c
Examining data/xfractint-20.4.10/common/intro.c
Examining data/xfractint-20.4.10/common/gifview.c
Examining data/xfractint-20.4.10/common/stereo.c
Examining data/xfractint-20.4.10/common/tgaview.c
Examining data/xfractint-20.4.10/common/bignumc.c
Examining data/xfractint-20.4.10/common/framain2.c
Examining data/xfractint-20.4.10/common/biginit.c
Examining data/xfractint-20.4.10/common/history.c
Examining data/xfractint-20.4.10/common/prompts2.c
Examining data/xfractint-20.4.10/common/fractalp.c
Examining data/xfractint-20.4.10/dos_help/hc.c

FINAL RESULTS:

data/xfractint-20.4.10/common/biginit.c:232:8:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
       sprintf(msg,nmsg,decimals);
data/xfractint-20.4.10/common/cmdfiles.c:513:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(curarg,argv[i]);
data/xfractint-20.4.10/common/cmdfiles.c:518:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(tempstring,curarg);
data/xfractint-20.4.10/common/cmdfiles.c:529:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy(readname,curarg);
data/xfractint-20.4.10/common/cmdfiles.c:541:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(CommandName,sptr+1); /* merge_pathnames modifies curarg, so get CommandName first */
data/xfractint-20.4.10/common/cmdfiles.c:577:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(searchfor.par, CommandFile);
data/xfractint-20.4.10/common/cmdfiles.c:578:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(searchfor.frm, FormFileName);
data/xfractint-20.4.10/common/cmdfiles.c:579:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(searchfor.lsys, LFileName);
data/xfractint-20.4.10/common/cmdfiles.c:580:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(searchfor.ifs, IFSFileName);
data/xfractint-20.4.10/common/cmdfiles.c:620:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(tempdir,p);
data/xfractint-20.4.10/common/cmdfiles.c:668:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(readname,DOTSLASH);           /* initially current directory */
data/xfractint-20.4.10/common/cmdfiles.c:1258:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(CommandFile,value);
data/xfractint-20.4.10/common/cmdfiles.c:1325:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat(gifmask,value);
data/xfractint-20.4.10/common/cmdfiles.c:1701:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(tempdir,value);
data/xfractint-20.4.10/common/cmdfiles.c:1709:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(workdir,value);
data/xfractint-20.4.10/common/cmdfiles.c:2143:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(orgfrmdir,value);
data/xfractint-20.4.10/common/cmdfiles.c:2567:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(FormName,value);
data/xfractint-20.4.10/common/cmdfiles.c:2580:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(LName,value);
data/xfractint-20.4.10/common/cmdfiles.c:2598:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(IFSName,value);
data/xfractint-20.4.10/common/cmdfiles.c:2853:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(light_name,value);
data/xfractint-20.4.10/common/cmdfiles.c:3076:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(msg,"%Fs%s%Fs",(char far *)argerrmsg1,badarg,(char far *)argerrmsg2);
data/xfractint-20.4.10/common/cmdfiles.c:3078:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(msg,"%Fs%s",(char far *)argerrmsg1,badarg);
data/xfractint-20.4.10/common/cmdfiles.c:3080:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(msg,"%s%s%s",argerrmsg1,badarg,argerrmsg2);
data/xfractint-20.4.10/common/cmdfiles.c:3082:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(msg,"%s%s",argerrmsg1,badarg);
data/xfractint-20.4.10/common/cmdfiles.c:3199:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(msg,"Can't find %s%Fs, please check %Fs",cmd,badfilename,modestr[mode]);
data/xfractint-20.4.10/common/cmdfiles.c:3201:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(msg,"Can't find %s%s, please check %s",cmd,badfilename,modestr[mode]);
data/xfractint-20.4.10/common/diskvid.c:149:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf,"%s",savename);
data/xfractint-20.4.10/common/editpal.c:439:4:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
   vsprintf(buff, format, arg_list);
data/xfractint-20.4.10/common/encoder.c:86:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(openfile, filename);  /* decode and open the filename */
data/xfractint-20.4.10/common/encoder.c:87:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(openfiletype, DEFAULTFRACTALTYPE);    /* determine the file
data/xfractint-20.4.10/common/encoder.c:94:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(openfiletype, period);
data/xfractint-20.4.10/common/encoder.c:100:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(openfile, openfiletype);
data/xfractint-20.4.10/common/encoder.c:102:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(tmpfile, openfile);
data/xfractint-20.4.10/common/encoder.c:103:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if (access(openfile, 0) != 0)/* file doesn't exist */
data/xfractint-20.4.10/common/encoder.c:118:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access(openfile, 2) != 0)
data/xfractint-20.4.10/common/encoder.c:120:10:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
         sprintf(tmpmsg, s_cantwrite, openfile);
data/xfractint-20.4.10/common/encoder.c:137:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(tmpmsg, s_cantcreate, tmpfile);
data/xfractint-20.4.10/common/encoder.c:147:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf, "Saving %s", tmpmsg);
data/xfractint-20.4.10/common/encoder.c:161:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(cmd, "Saving to: %s", openfile);
data/xfractint-20.4.10/common/encoder.c:187:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf, "Save of %s interrupted.\nCancel to ", openfile);
data/xfractint-20.4.10/common/encoder.c:250:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
         sprintf(tmpmsg, " File saved as %s ", tmpfile);
data/xfractint-20.4.10/common/encoder.c:628:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(fsave_info.form_name, nameptr);
data/xfractint-20.4.10/common/f16.c:52:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(filename, fname);
data/xfractint-20.4.10/common/fractalb.c:36:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(msg,s);
data/xfractint-20.4.10/common/fractalb.c:46:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg,"%s\n\
data/xfractint-20.4.10/common/fractalb.c:63:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg1,"bnxmin=%s\nxxmin= %.20f\n\n",msg,xxmin);
data/xfractint-20.4.10/common/fractalb.c:64:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(msg3,s);
data/xfractint-20.4.10/common/fractalb.c:66:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(msg3,msg1);
data/xfractint-20.4.10/common/fractalb.c:68:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg1,"bnxmax=%s\nxxmax= %.20f\n\n",msg,xxmax);
data/xfractint-20.4.10/common/fractalb.c:69:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(msg3,msg1);
data/xfractint-20.4.10/common/fractalb.c:71:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg1,"bnymin=%s\nyymin= %.20f\n\n",msg,yymin);
data/xfractint-20.4.10/common/fractalb.c:72:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(msg3,msg1);
data/xfractint-20.4.10/common/fractalb.c:74:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg1,"bnymax=%s\nyymax= %.20f\n\n",msg,yymax);
data/xfractint-20.4.10/common/fractalb.c:75:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(msg3,msg1);
data/xfractint-20.4.10/common/fractalb.c:77:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg1,"bnx3rd=%s\nxx3rd= %.20f\n\n",msg,xx3rd);
data/xfractint-20.4.10/common/fractalb.c:78:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(msg3,msg1);
data/xfractint-20.4.10/common/fractalb.c:80:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg1,"bny3rd=%s\nyy3rd= %.20f\n\n",msg,yy3rd);
data/xfractint-20.4.10/common/fractalb.c:81:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(msg3,msg1);
data/xfractint-20.4.10/common/fractalb.c:90:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg, "%s\n\
data/xfractint-20.4.10/common/fractalb.c:107:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg1,"bfxmin=%s\nxxmin= %.20f decimals %d bflength %d\n\n",
data/xfractint-20.4.10/common/fractalb.c:109:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(msg3,s);
data/xfractint-20.4.10/common/fractalb.c:111:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(msg3,msg1);
data/xfractint-20.4.10/common/fractalb.c:113:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg1,"bfxmax=%s\nxxmax= %.20f\n\n",msg,xxmax);
data/xfractint-20.4.10/common/fractalb.c:114:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(msg3,msg1);
data/xfractint-20.4.10/common/fractalb.c:116:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg1,"bfymin=%s\nyymin= %.20f\n\n",msg,yymin);
data/xfractint-20.4.10/common/fractalb.c:117:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(msg3,msg1);
data/xfractint-20.4.10/common/fractalb.c:119:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg1,"bfymax=%s\nyymax= %.20f\n\n",msg,yymax);
data/xfractint-20.4.10/common/fractalb.c:120:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(msg3,msg1);
data/xfractint-20.4.10/common/fractalb.c:122:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg1,"bfx3rd=%s\nxx3rd= %.20f\n\n",msg,xx3rd);
data/xfractint-20.4.10/common/fractalb.c:123:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(msg3,msg1);
data/xfractint-20.4.10/common/fractalb.c:125:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg1,"bfy3rd=%s\nyy3rd= %.20f\n\n",msg,yy3rd);
data/xfractint-20.4.10/common/fractalb.c:126:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(msg3,msg1);
data/xfractint-20.4.10/common/fractalb.c:136:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg1,"bfsxmin=%s\nxxmin= %.20f\n\n",msg,xxmin);
data/xfractint-20.4.10/common/fractalb.c:137:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(msg3,s);
data/xfractint-20.4.10/common/fractalb.c:139:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(msg3,msg1);
data/xfractint-20.4.10/common/fractalb.c:141:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg1,"bfsxmax=%s\nxxmax= %.20f\n\n",msg,xxmax);
data/xfractint-20.4.10/common/fractalb.c:142:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(msg3,msg1);
data/xfractint-20.4.10/common/fractalb.c:144:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg1,"bfsymin=%s\nyymin= %.20f\n\n",msg,yymin);
data/xfractint-20.4.10/common/fractalb.c:145:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(msg3,msg1);
data/xfractint-20.4.10/common/fractalb.c:147:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg1,"bfsymax=%s\nyymax= %.20f\n\n",msg,yymax);
data/xfractint-20.4.10/common/fractalb.c:148:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(msg3,msg1);
data/xfractint-20.4.10/common/fractalb.c:150:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg1,"bfsx3rd=%s\nxx3rd= %.20f\n\n",msg,xx3rd);
data/xfractint-20.4.10/common/fractalb.c:151:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(msg3,msg1);
data/xfractint-20.4.10/common/fractalb.c:153:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg1,"bfsy3rd=%s\nyy3rd= %.20f\n\n",msg,yy3rd);
data/xfractint-20.4.10/common/fractalb.c:154:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(msg3,msg1);
data/xfractint-20.4.10/common/fractalb.c:164:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg3,"\n%s->%s\n%s->%s",s1,msg1,s2,msg2);
data/xfractint-20.4.10/common/fractalb.c:175:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg4,"\n%s->%s\n%s->%s\n%s->%s",s1,msg1,s2,msg2,s3,msg3);
data/xfractint-20.4.10/common/fractalb.c:193:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg,"aspect %s\nfloat %13.10f\nbf    %s\n\n",
data/xfractint-20.4.10/common/fractalb.c:208:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg1,"%s\nbignum=%s\ndouble=%.20Lf\n\n",s,msg,x);
data/xfractint-20.4.10/common/fractalb.c:218:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg1,"%s\nbignum=%s\ndouble=%.20Lf\n\n",s,msg,x);
data/xfractint-20.4.10/common/fractalb.c:227:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(msg,s);
data/xfractint-20.4.10/common/fractint.c:200:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
         if(access(path,0)==0)
data/xfractint-20.4.10/common/fractint.c:365:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(file_name_stack[name_stack_ptr],browsename);
data/xfractint-20.4.10/common/framain2.c:139:19:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                  sprintf(buf,"%s\n%s",(char far *)msgxy1,(char far *)msgxy2);
data/xfractint-20.4.10/common/framain2.c:1019:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(browsename, file_name_stack[name_stack_ptr]);
data/xfractint-20.4.10/common/framain2.c:1159:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               strcpy(readname, savename);
data/xfractint-20.4.10/common/framain2.c:1201:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy(file_name_stack[tmp - 1], file_name_stack[tmp]);
data/xfractint-20.4.10/common/framain2.c:1205:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(file_name_stack[name_stack_ptr], browsename);
data/xfractint-20.4.10/common/framain2.c:1228:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               strcpy(browsename, file_name_stack[name_stack_ptr]);
data/xfractint-20.4.10/common/framain2.c:1624:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               strcpy(readname, savename);
data/xfractint-20.4.10/common/gifview.c:99:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(temp1,stereomapname);
data/xfractint-20.4.10/common/gifview.c:101:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(temp1,readname);
data/xfractint-20.4.10/common/gifview.c:103:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(temp1,DEFAULTFRACTALTYPE);
data/xfractint-20.4.10/common/gifview.c:109:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(temp1,stereomapname);
data/xfractint-20.4.10/common/gifview.c:111:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(temp1,readname);
data/xfractint-20.4.10/common/gifview.c:112:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat(temp1,ALTERNATEFRACTALTYPE);
data/xfractint-20.4.10/common/gifview.c:187:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
       sprintf(msg,"restoring %s",tmpname);
data/xfractint-20.4.10/common/help.c:966:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(path, _argv[0]);
data/xfractint-20.4.10/common/help.c:969:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(path, __argv[0]);   /* note: __argv may be undocumented in MSC */
data/xfractint-20.4.10/common/help.c:979:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(ptr, filename);
data/xfractint-20.4.10/common/help.c:985:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(path,SRCDIR);
data/xfractint-20.4.10/common/help.c:987:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(path,filename);
data/xfractint-20.4.10/common/line3d.c:287:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(s, "%s%d", mapping, currow);
data/xfractint-20.4.10/common/line3d.c:1376:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(msgbuf, "%Fs%Fs%s >", (char far *)OOPS, (char far *)str1, File_Name1);
data/xfractint-20.4.10/common/line3d.c:1378:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(msgbuf, "%s%s%s >", OOPS, str1, File_Name1);
data/xfractint-20.4.10/common/line3d.c:1383:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(msgbuf, "%Fs%Fs%s >", (char far *)OOPS, (char far *)outofdisk, File_Name1);
data/xfractint-20.4.10/common/line3d.c:1385:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(msgbuf, "%s%s%s >", OOPS, outofdisk, File_Name1);
data/xfractint-20.4.10/common/line3d.c:1389:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(msgbuf, s_f, (char far *)OOPS, (char far *)str3);
data/xfractint-20.4.10/common/line3d.c:1392:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(msgbuf, s_f, (char far *)OOPS, (char far *)E1);
data/xfractint-20.4.10/common/line3d.c:1807:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(File_Ptr1, dxf_begin);
data/xfractint-20.4.10/common/line3d.c:1810:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(File_Ptr1, banner, (char far *)s3, release / 100., (char far *)s3a);
data/xfractint-20.4.10/common/line3d.c:1819:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(File_Ptr1, s_f, (char far *)declare, (char far *)frac_default);
data/xfractint-20.4.10/common/line3d.c:1821:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(File_Ptr1, s_f, (char far *)s_color, (char far *)dflt);
data/xfractint-20.4.10/common/line3d.c:1827:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(File_Ptr1, s_f, (char far *)surf, (char far *)d_color);
data/xfractint-20.4.10/common/line3d.c:1833:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(File_Ptr1, s_f, (char far *)d_color, (char far *)r_surf);
data/xfractint-20.4.10/common/line3d.c:1836:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(File_Ptr1, s_f, (char far *)rs_surf, (char far *)d_color);
data/xfractint-20.4.10/common/line3d.c:1839:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(File_Ptr1, s_n);
data/xfractint-20.4.10/common/line3d.c:1843:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(File_Ptr1, s_fff, (char far *)ray_comment1, (char far *)ray_comment2, (char far *)grid3);
data/xfractint-20.4.10/common/line3d.c:1935:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(File_Ptr1, f1, c[i]);
data/xfractint-20.4.10/common/line3d.c:1960:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(File_Ptr1, s_n);
data/xfractint-20.4.10/common/line3d.c:1970:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(File_Ptr1, dxf_3dface, min(255, max(1, c1)));
data/xfractint-20.4.10/common/line3d.c:1975:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(File_Ptr1, s_n);
data/xfractint-20.4.10/common/line3d.c:1996:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf(File_Ptr1, dxf_vertex, 10 * (j + 1) + i, pt_t[i][j]);
data/xfractint-20.4.10/common/line3d.c:1998:16:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
               fprintf(File_Ptr1, dxf_vertex, 10 * (j + 1) + i + 1,
data/xfractint-20.4.10/common/line3d.c:2002:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf(File_Ptr1, f1, pt_t[i][j]); /* Right handed */
data/xfractint-20.4.10/common/line3d.c:2004:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf(File_Ptr1, f1, pt_t[2 - i][j]);     /* Left handed */
data/xfractint-20.4.10/common/line3d.c:2052:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(File_Ptr1, s_n);
data/xfractint-20.4.10/common/line3d.c:2055:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(File_Ptr1, s_n);
data/xfractint-20.4.10/common/line3d.c:2145:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(File_Ptr1, fmt, (char far *)plane, (char far *)m1, (char far *)z, (char far *)z, -min_xyz[0], (char far *)end, (char far *)plane);
data/xfractint-20.4.10/common/line3d.c:2146:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(File_Ptr1, fmt, (char far *)plane, (char far *)one, (char far *)z, (char far *)z, max_xyz[0], (char far *)end, (char far *)plane);
data/xfractint-20.4.10/common/line3d.c:2147:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(File_Ptr1, fmt, (char far *)plane, (char far *)z, (char far *)m1, (char far *)z, -min_xyz[1], (char far *)end, (char far *)plane);
data/xfractint-20.4.10/common/line3d.c:2148:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(File_Ptr1, fmt, (char far *)plane, (char far *)z, (char far *)one, (char far *)z, max_xyz[1], (char far *)end, (char far *)plane);
data/xfractint-20.4.10/common/line3d.c:2149:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(File_Ptr1, fmt, (char far *)plane, (char far *)z, (char far *)z, (char far *)m1, -min_xyz[2], (char far *)end, (char far *)plane);
data/xfractint-20.4.10/common/line3d.c:2150:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(File_Ptr1, fmt, (char far *)plane, (char far *)z, (char far *)z, (char far *)one, max_xyz[2], (char far *)end, (char far *)plane);
data/xfractint-20.4.10/common/line3d.c:2168:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(File_Ptr1, s_n);    /* EB & DG: too many newlines */
data/xfractint-20.4.10/common/line3d.c:2180:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(File_Ptr1, s_n); /* EB & DG: too many newlines */
data/xfractint-20.4.10/common/line3d.c:2207:19:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                  fprintf(File_Ptr1, f2, i, j, i, j + 1);
data/xfractint-20.4.10/common/line3d.c:2209:19:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                  fprintf(File_Ptr1, f2, i, j, i + 1, j);
data/xfractint-20.4.10/common/line3d.c:2211:19:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                  fprintf(File_Ptr1, f2, i, j, i - 1, j + 1);
data/xfractint-20.4.10/common/line3d.c:2222:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(File_Ptr1, dxf_end);
data/xfractint-20.4.10/common/line3d.c:2720:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(tmpmsg, "used %ld%s", check_extra, extramsg);
data/xfractint-20.4.10/common/loadfdos.c:86:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(buf,"%-5s %-25s %-4s %5d %5d %3d %-25s",  /* 78 chars */
data/xfractint-20.4.10/common/loadfdos.c:263:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
               sprintf(temp1,"Type: %s -> %s",nameptr,blk_3_info->form_name);
data/xfractint-20.4.10/common/loadfdos.c:265:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
           sprintf(temp1,"Type: %s",nameptr);
data/xfractint-20.4.10/common/loadfdos.c:267:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf((char *)dstack,"File: %-44s  %d x %d x %d\n%-52s",
data/xfractint-20.4.10/common/loadfdos.c:280:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat((char *)dstack,temp1);
data/xfractint-20.4.10/common/loadfdos.c:288:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat((char *)dstack,temp1);
data/xfractint-20.4.10/common/loadfile.c:63:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(msg,"Sorry, %s isn't a file I can decode.",readname);
data/xfractint-20.4.10/common/loadfile.c:71:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(msg,"Warning: %s has a bad fractal type; using 0",readname);
data/xfractint-20.4.10/common/loadfile.c:179:32:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      save_system  = read_info.system;
data/xfractint-20.4.10/common/loadfile.c:412:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(nameptr,blk_3_info.form_name);
data/xfractint-20.4.10/common/loadfile.c:646:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               strcpy(info->info_id,INFO_ID);
data/xfractint-20.4.10/common/loadfile.c:705:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy(blk_3_info->form_name,fload_info.form_name);
data/xfractint-20.4.10/common/loadfile.c:1448:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(newname,tmpmask);
data/xfractint-20.4.10/common/loadfile.c:1449:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat(mesg,tmpmask);
data/xfractint-20.4.10/common/loadfile.c:1897:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(file_name_stack[i],newname);    /* insert the new name */
data/xfractint-20.4.10/common/loadmap.c:55:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(temp,MAP_name);
data/xfractint-20.4.10/common/loadmap.c:56:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(temp_fn,fn);
data/xfractint-20.4.10/common/loadmap.c:67:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(line,"Could not load color map %s",fn);
data/xfractint-20.4.10/common/loadmap.c:96:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(colorfile,fn);
data/xfractint-20.4.10/common/lorenz.c:1447:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(fp,orbitsave_format,*p0,*p1,0.0);
data/xfractint-20.4.10/common/lorenz.c:1579:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(fp,orbitsave_format,(double)*p0/fudge,(double)*p1/fudge,0.0);
data/xfractint-20.4.10/common/lorenz.c:1637:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(fp,orbitsave_format,(double)inf.orbit[0]/fudge,(double)inf.orbit[1]/fudge,(double)inf.orbit[2]/fudge);
data/xfractint-20.4.10/common/lorenz.c:1737:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(fp,orbitsave_format,inf.orbit[0],inf.orbit[1],inf.orbit[2]);
data/xfractint-20.4.10/common/lorenz.c:1932:15:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
              fprintf(fp,orbitsave_format,*p0,*p1,0.0);
data/xfractint-20.4.10/common/lorenz.c:2224:11:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          fprintf(fp,orbitsave_format,newx,newy,newz);
data/xfractint-20.4.10/common/lorenz.c:2339:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(fp,orbitsave_format,(double)newx/fudge,(double)newy/fudge,0.0);
data/xfractint-20.4.10/common/lorenz.c:2443:10:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
         fprintf(fp,orbitsave_format,(double)newx/fudge,(double)newy/fudge,(double)newz/fudge);
data/xfractint-20.4.10/common/lsys.c:175:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
               sprintf(&msgbuf[strlen(msgbuf)],
data/xfractint-20.4.10/common/lsys.c:185:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               strcpy(fixed,word);
data/xfractint-20.4.10/common/lsys.c:187:19:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                  strcat(fixed,temp);
data/xfractint-20.4.10/common/lsys.c:192:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               strcpy(fixed,temp);
data/xfractint-20.4.10/common/lsys.c:205:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
               sprintf(&msgbuf[strlen(msgbuf)],
data/xfractint-20.4.10/common/lsys.c:215:19:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                  sprintf(&msgbuf[strlen(msgbuf)],
data/xfractint-20.4.10/common/memory.c:201:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
   sprintf(buf,nmsg);
data/xfractint-20.4.10/common/memory.c:240:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
   sprintf(buf,nmsg,howmuch,memstr[stored_at]);
data/xfractint-20.4.10/common/memory.c:409:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
   sprintf(buf,nmsg,tmpextra,tmpfar,tmpexp,tmpext,tmpdisk);
data/xfractint-20.4.10/common/memory.c:421:4:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
   sprintf(buf,nmsg,handle,memstr[handletable[handle].Nowhere.stored_at],
data/xfractint-20.4.10/common/memory.c:462:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(buf,nmsg,memstr[handletable[i].Nowhere.stored_at],i);
data/xfractint-20.4.10/common/memory.c:644:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(buf,nmsg,memstr[stored_at],toallocate,memstr[use_this_type],handle);
data/xfractint-20.4.10/common/miscovl.c:352:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(outname, CommandFile);
data/xfractint-20.4.10/common/miscovl.c:354:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access(CommandFile, 0) == 0)
data/xfractint-20.4.10/common/miscovl.c:357:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
         if (access(CommandFile, 6))
data/xfractint-20.4.10/common/miscovl.c:359:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(buf, s_cantwrite, CommandFile);
data/xfractint-20.4.10/common/miscovl.c:374:10:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
         sprintf(buf, s_cantcreate, outname);
data/xfractint-20.4.10/common/miscovl.c:454:16:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
               strcat(PCommandName,buf);
data/xfractint-20.4.10/common/miscovl.c:1270:4:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
   vsprintf(bufptr,parm,args);
data/xfractint-20.4.10/common/miscovl.c:1303:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(wbdata->buf,wbdata->buf+len);
data/xfractint-20.4.10/common/miscovl.c:1483:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(buf,exptr);
data/xfractint-20.4.10/common/miscovl.c:1829:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(buf,"%-5s %-25s %5d %5d ",  /* 44 chars */
data/xfractint-20.4.10/common/miscovl.c:1832:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(local_buf,"%s%3d",  /* 47 chars */
data/xfractint-20.4.10/common/miscovl.c:1835:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(local_buf,"%s%3s",  /* 47 chars */
data/xfractint-20.4.10/common/miscovl.c:1840:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(buf,"%s%c %-25s",  /* 74 chars */
data/xfractint-20.4.10/common/miscovl.c:1904:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if (access(cfgname,6)) {
data/xfractint-20.4.10/common/miscovl.c:1905:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(buf,s_cantwrite,cfgname);
data/xfractint-20.4.10/common/miscovl.c:1909:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(outname,cfgname);
data/xfractint-20.4.10/common/miscovl.c:1915:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(buf,s_cantcreate,outname);
data/xfractint-20.4.10/common/miscovl.c:1932:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(buf,vident.name);
data/xfractint-20.4.10/common/miscovl.c:1945:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(colorsbuf,"%3s",
data/xfractint-20.4.10/common/miscovl.c:2021:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(msgbuf, gifout);
data/xfractint-20.4.10/common/miscovl.c:2023:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(msgbuf, xmult, ymult);
data/xfractint-20.4.10/common/miscovl.c:2027:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(msgbuf, gifout);
data/xfractint-20.4.10/common/miscovl.c:2037:13:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            printf(msgbuf, gifin);
data/xfractint-20.4.10/common/miscovl.c:2083:13:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            printf(msgbuf, gifin);
data/xfractint-20.4.10/common/miscovl.c:2183:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(msgbuf, gifin);
data/xfractint-20.4.10/common/miscovl.c:2192:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(msgbuf);
data/xfractint-20.4.10/common/miscovl.c:2211:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(msgbuf, gifout);
data/xfractint-20.4.10/common/miscovl.c:2396:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(out,&str[20]);
data/xfractint-20.4.10/common/miscovl.c:2427:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf,"%s",vidmde);
data/xfractint-20.4.10/common/miscres.c:52:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if(checkcurdir != 0 && access(temp_path,0)==0) {   /* file exists */
data/xfractint-20.4.10/common/miscres.c:53:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(fullpathname,temp_path);
data/xfractint-20.4.10/common/miscres.c:60:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if(access(temp_path,0)==0) {   /* file exists */
data/xfractint-20.4.10/common/miscres.c:61:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(fullpathname,temp_path);
data/xfractint-20.4.10/common/miscres.c:77:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(&fullpathname[3],temp_path);
data/xfractint-20.4.10/common/miscres.c:558:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(openfile,name);
data/xfractint-20.4.10/common/miscres.c:559:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(opentype,ext);
data/xfractint-20.4.10/common/miscres.c:563:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(opentype,&openfile[i]);
data/xfractint-20.4.10/common/miscres.c:569:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(opentype,period);
data/xfractint-20.4.10/common/miscres.c:572:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(openfile,opentype);
data/xfractint-20.4.10/common/miscres.c:573:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
   if (access(openfile,0) != 0) /* file doesn't exist */
data/xfractint-20.4.10/common/miscres.c:575:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(name,openfile);
data/xfractint-20.4.10/common/miscres.c:613:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf," function=%s",tmpbuf);
data/xfractint-20.4.10/common/miscres.c:629:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(buf,trigfn[trigndx[0]].name);
data/xfractint-20.4.10/common/miscres.c:632:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
         sprintf(tmpbuf,"/%s",trigfn[trigndx[i]].name);
data/xfractint-20.4.10/common/miscres.c:633:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat(buf,tmpbuf);
data/xfractint-20.4.10/common/miscres.c:772:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(msg,"%s=%s",name,var);
data/xfractint-20.4.10/common/miscres.c:849:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(msg,"xxstart %d xxstop %d yystart %d yystop %d %s uses_ismand %d",
data/xfractint-20.4.10/common/miscres.c:1123:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(msg,"Video: %dx%dx%d %s %s",
data/xfractint-20.4.10/common/miscres.c:1326:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf,"%s%ld inside pixels of %ld%s%f",
data/xfractint-20.4.10/common/miscres.c:1483:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               strcpy(filename, fullpath);
data/xfractint-20.4.10/common/miscres.c:1497:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat(parsearchname, itemname);
data/xfractint-20.4.10/common/miscres.c:1504:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat(parsearchname, itemname);
data/xfractint-20.4.10/common/miscres.c:1511:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat(parsearchname, itemname);
data/xfractint-20.4.10/common/miscres.c:1517:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(parsearchname, itemname);
data/xfractint-20.4.10/common/miscres.c:1527:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(filename, CommandFile);
data/xfractint-20.4.10/common/miscres.c:1541:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(filename, fullpath);
data/xfractint-20.4.10/common/miscres.c:1561:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(msg,"Searching %s for %s      ",DTA.filename,itemname);
data/xfractint-20.4.10/common/miscres.c:1570:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy(filename, fullpath);
data/xfractint-20.4.10/common/miscres.c:1612:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(filename, fullpath);
data/xfractint-20.4.10/common/miscres.c:1623:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(fullpath,"'%s' file entry item not found",itemname);
data/xfractint-20.4.10/common/parser.c:3224:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(tok->token_str, temp_tok.token_str);
data/xfractint-20.4.10/common/parser.c:3234:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(tok->token_str, temp_tok.token_str);
data/xfractint-20.4.10/common/parser.c:3755:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat(FormulaStr, temp_tok.token_str);
data/xfractint-20.4.10/common/parser.c:3773:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(FormulaStr, temp_tok.token_str);
data/xfractint-20.4.10/common/parser.c:4044:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(&msgbuf[strlen(msgbuf)], "Error(%d) at line %d:  %s\n  ", errors[j].error_number, line_number, ParseErrs(errors[j].error_number));
data/xfractint-20.4.10/common/parser.c:4098:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat (msgbuf, tok.token_str);
data/xfractint-20.4.10/common/parserfp.c:279:10:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
         sprintf(cDbgMsg, (y), (p) ); \
data/xfractint-20.4.10/common/parserfp.c:284:10:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
         sprintf(cDbgMsg, (y), (p), (q) ); \
data/xfractint-20.4.10/common/parserfp.c:289:10:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
         sprintf(cDbgMsg, (y), (p), (q), (r) ); \
data/xfractint-20.4.10/common/parserfp.c:294:10:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
         sprintf(cDbgMsg, (y), (p), (q), (r), (s) ); \
data/xfractint-20.4.10/common/printer.c:1052:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(cmd, "%s %s &", PSviewer, PrintName);
data/xfractint-20.4.10/common/printer.c:1053:13:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    dummy = system(cmd);
data/xfractint-20.4.10/common/printer.c:1388:4:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
   vsprintf(s,fmt1,arg);
data/xfractint-20.4.10/common/prompts1.c:707:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(buf,val->uval.ch.list[val->uval.ch.val]);
data/xfractint-20.4.10/common/prompts1.c:795:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(buf,list[curval]);
data/xfractint-20.4.10/common/prompts1.c:838:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(fld,list[curval]);
data/xfractint-20.4.10/common/prompts1.c:954:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(FormFileName, searchfor.frm);
data/xfractint-20.4.10/common/prompts1.c:956:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(LFileName, searchfor.lsys);
data/xfractint-20.4.10/common/prompts1.c:958:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(IFSFileName, searchfor.ifs);
data/xfractint-20.4.10/common/prompts1.c:1474:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
         sprintf(bailoutmsg,"    (%s default is %ld)",tmpptr,long_i);
data/xfractint-20.4.10/common/prompts1.c:1575:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(msg,"Julibrot Parameters (orbit= %s)",juliorbitname);
data/xfractint-20.4.10/common/prompts1.c:1577:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(msg,"Parameters for fractal type %s",typename);
data/xfractint-20.4.10/common/prompts1.c:1772:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(temp1,s_cantfind, filename);
data/xfractint-20.4.10/common/prompts1.c:1775:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
         sprintf(buf,"Select %s File",title);
data/xfractint-20.4.10/common/prompts1.c:2026:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(buf,entryname); /* preset to last choice made */
data/xfractint-20.4.10/common/prompts1.c:2027:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(temp1,"%s Selection\nFile: %s",title,filename);
data/xfractint-20.4.10/common/prompts1.c:2113:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(infhdg,gfe_title);
data/xfractint-20.4.10/common/prompts1.c:2345:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(buf,"%-20Fs%-56s",gfe_choices[choice]->name,line);
data/xfractint-20.4.10/common/prompts1.c:2347:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(buf,"%-20s%-56s",gfe_choices[choice]->name,line);
data/xfractint-20.4.10/common/prompts1.c:2503:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(uvalues[k].uval.sval,ray_name);
data/xfractint-20.4.10/common/prompts1.c:2549:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(ray_name,uvalues[k++].uval.sval);
data/xfractint-20.4.10/common/prompts1.c:2796:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(uvalues[k].uval.sval,light_name);
data/xfractint-20.4.10/common/prompts1.c:2848:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(light_name,uvalues[k++].uval.sval);
data/xfractint-20.4.10/common/prompts1.c:2871:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(temp1,MAP_name);
data/xfractint-20.4.10/common/prompts1.c:2935:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(funnyglasses_map_name,Glasses1Map);
data/xfractint-20.4.10/common/prompts1.c:2942:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(funnyglasses_map_name,Glasses1Map);
data/xfractint-20.4.10/common/prompts1.c:2984:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(uvalues[k].uval.sval,funnyglasses_map_name);
data/xfractint-20.4.10/common/prompts1.c:3005:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(funnyglasses_map_name,uvalues[k].uval.sval);
data/xfractint-20.4.10/common/prompts2.c:213:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(prevsavename,savename);
data/xfractint-20.4.10/common/prompts2.c:219:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(uvalues[k].uval.sval,savenameptr);
data/xfractint-20.4.10/common/prompts2.c:253:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(uvalues[k].uval.sval,s_normal);
data/xfractint-20.4.10/common/prompts2.c:350:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(savenameptr,uvalues[++k].uval.sval);
data/xfractint-20.4.10/common/prompts2.c:1204:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat(rds6,p);
data/xfractint-20.4.10/common/prompts2.c:1433:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(tmpname,searchdir);
data/xfractint-20.4.10/common/prompts2.c:1434:14:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
             strcat(tmpname,dirEntry->d_name);
data/xfractint-20.4.10/common/prompts2.c:1551:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(old_flname,flname);
data/xfractint-20.4.10/common/prompts2.c:1556:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(flname,DOTSLASH);
data/xfractint-20.4.10/common/prompts2.c:1573:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(dir,DOTSLASH);
data/xfractint-20.4.10/common/prompts2.c:1601:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(DTA.filename,SLASH);
data/xfractint-20.4.10/common/prompts2.c:1617:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(&(tmpmask[masklen]),masks[j]);
data/xfractint-20.4.10/common/prompts2.c:1625:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
               sprintf(speedstr,"%s",DTA.filename);
data/xfractint-20.4.10/common/prompts2.c:1668:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(dir,SLASH);
data/xfractint-20.4.10/common/prompts2.c:1674:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(tmpmask,masks[0]);
data/xfractint-20.4.10/common/prompts2.c:1676:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(temp1,hdg);
data/xfractint-20.4.10/common/prompts2.c:1678:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(temp1,tmpmask);
data/xfractint-20.4.10/common/prompts2.c:1679:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(speedstr,filename);
data/xfractint-20.4.10/common/prompts2.c:1704:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(dir,fract_dir1);
data/xfractint-20.4.10/common/prompts2.c:1708:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(dir,fract_dir2);
data/xfractint-20.4.10/common/prompts2.c:1718:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(flname,old_flname);
data/xfractint-20.4.10/common/prompts2.c:1728:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               strcpy(dir,DOTDOTSLASH);
data/xfractint-20.4.10/common/prompts2.c:1768:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(drive,drive1);
data/xfractint-20.4.10/common/prompts2.c:1770:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(dir,dir1);
data/xfractint-20.4.10/common/prompts2.c:1784:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(flname,fullpath);
data/xfractint-20.4.10/common/prompts2.c:1787:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(flname,speedstr);
data/xfractint-20.4.10/common/prompts2.c:1997:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(template,drive);
data/xfractint-20.4.10/common/prompts2.c:2000:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(template,dir);
data/xfractint-20.4.10/common/prompts2.c:2002:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(template,fname);
data/xfractint-20.4.10/common/prompts2.c:2004:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(template,ext);
data/xfractint-20.4.10/common/prompts2.c:2020:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(dirname,SLASH);
data/xfractint-20.4.10/common/prompts2.c:2027:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(target,dir);
data/xfractint-20.4.10/common/prompts2.c:2028:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(target,name);
data/xfractint-20.4.10/common/prompts2.c:2079:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(curdir,SLASH);
data/xfractint-20.4.10/common/prompts2.c:2087:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(buf,&dirname[2]);
data/xfractint-20.4.10/common/prompts2.c:2088:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(dirname,buf);
data/xfractint-20.4.10/common/prompts2.c:2095:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat(curdir,SLASH);
data/xfractint-20.4.10/common/prompts2.c:2096:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(buf,&dirname[3]);
data/xfractint-20.4.10/common/prompts2.c:2097:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(dirname,buf);
data/xfractint-20.4.10/common/prompts2.c:2099:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(buf,dirname);
data/xfractint-20.4.10/common/prompts2.c:2102:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(dirname,SLASH);
data/xfractint-20.4.10/common/prompts2.c:2103:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(dirname,curdir);
data/xfractint-20.4.10/common/prompts2.c:2104:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(dirname,buf);
data/xfractint-20.4.10/common/prompts2.c:2572:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(old_browsemask,browsemask);
data/xfractint-20.4.10/common/prompts2.c:2607:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(uvalues[k].uval.sval,browsemask);
data/xfractint-20.4.10/common/prompts2.c:2655:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(browsemask,uvalues[++k].uval.sval);
data/xfractint-20.4.10/common/prompts2.c:2738:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(temp_path,newfilename);
data/xfractint-20.4.10/common/prompts2.c:2739:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(newfilename,temp_path);
data/xfractint-20.4.10/common/prompts2.c:2752:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(temp_path,newfilename);
data/xfractint-20.4.10/common/prompts2.c:2753:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(newfilename,temp_path);
data/xfractint-20.4.10/common/prompts2.c:2761:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(newfilename,temp_path);
data/xfractint-20.4.10/common/prompts2.c:2781:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(drive1,drive);
data/xfractint-20.4.10/common/prompts2.c:2783:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(dir1,dir);
data/xfractint-20.4.10/common/prompts2.c:2785:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(fname1,fname);
data/xfractint-20.4.10/common/prompts2.c:2787:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(ext1,ext);
data/xfractint-20.4.10/common/prompts2.c:2799:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
         if(access(oldfullpath,0))
data/xfractint-20.4.10/common/realdos.c:238:7:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      printf(msg);
data/xfractint-20.4.10/common/realdos.c:320:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
   strcat(msg,buf);
data/xfractint-20.4.10/common/realdos.c:323:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(msg,buf);
data/xfractint-20.4.10/common/realdos.c:327:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(msg,buf);
data/xfractint-20.4.10/common/realdos.c:517:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(buf,speedstring);
data/xfractint-20.4.10/common/realdos.c:1417:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(savefld,fld);
data/xfractint-20.4.10/common/realdos.c:1421:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(buf,fld);
data/xfractint-20.4.10/common/realdos.c:1476:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(fld,savefld);
data/xfractint-20.4.10/common/realdos.c:1531:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy(fld,tmpfld);
data/xfractint-20.4.10/common/rotate.c:437:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(palname,MAP_name);
data/xfractint-20.4.10/common/rotate.c:474:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(colorfile,temp1);
data/xfractint-20.4.10/common/rotate.c:487:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(filename,MAP_name);
data/xfractint-20.4.10/common/slideshw.c:263:14:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
         if (fscanf(fpss,"%s",buffer) != 1)
data/xfractint-20.4.10/common/slideshw.c:276:22:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
               err = fscanf(fpss,"%s",buffer1);
data/xfractint-20.4.10/common/slideshw.c:316:7:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      sprintf(msg,s_cantunderstand,buffer);
data/xfractint-20.4.10/common/slideshw.c:386:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf(fpss,buf);
data/xfractint-20.4.10/dos_help/hc.c:306:4:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   vprintf(format, arg);
data/xfractint-20.4.10/dos_help/hc.c:442:20:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#   define msg    (printf((quiet_mode)?"":"[%04d] ", __LINE__), msg)
data/xfractint-20.4.10/dos_help/hc.c:1050:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
         sprintf(curr, "%-5s %*.0s%s", c.id, indent*2, "", c.name);
data/xfractint-20.4.10/dos_help/hc.c:1857:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy(hdr_fname, cmd+8);
data/xfractint-20.4.10/dos_help/hc.c:1865:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy(hlp_fname, cmd+8);
data/xfractint-20.4.10/dos_help/hc.c:3797:22:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                     strcpy(swappath, (*arg)+2);
data/xfractint-20.4.10/dos_help/hc.c:3814:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               strcpy(fname1, *arg);
data/xfractint-20.4.10/dos_help/hc.c:3816:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               strcpy(fname2, *arg);
data/xfractint-20.4.10/dos_help/hc.c:3857:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(src_fname, (fname1[0]=='\0') ? DEFAULT_SRC_FNAME : fname1);
data/xfractint-20.4.10/dos_help/hc.c:3859:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat(swappath, SWAP_FNAME);
data/xfractint-20.4.10/dos_help/hc.c:3901:10:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
         strcpy(src_fname, (fname1[0]=='\0') ? DEFAULT_SRC_FNAME : fname1);
data/xfractint-20.4.10/dos_help/hc.c:3903:10:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         strcat(swappath, SWAP_FNAME);
data/xfractint-20.4.10/headers/fractint.h:178:11:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    short system;         /* 0 for dos, 1 for windows */
data/xfractint-20.4.10/unix/diskvidu.c:107:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf,"%s",savename);
data/xfractint-20.4.10/unix/general.c:436:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(a,b);
data/xfractint-20.4.10/unix/general.c:465:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(a,b);
data/xfractint-20.4.10/unix/general.c:604:19:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    getInt(&info->system,&bufPtr,dir);
data/xfractint-20.4.10/unix/unix.c:276:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fullpathname,filename);
data/xfractint-20.4.10/unix/unix.c:285:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(fullpathname,fractdir);
data/xfractint-20.4.10/unix/unix.c:287:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(fullpathname,filename);
data/xfractint-20.4.10/unix/unix.c:294:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(fullpathname,SRCDIR);
data/xfractint-20.4.10/unix/unix.c:296:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(fullpathname,filename);
data/xfractint-20.4.10/unix/unix.c:303:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(fullpathname,filename);
data/xfractint-20.4.10/unix/unixscr.c:2513:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(cmd, "xterm -geometry 80x32 -fn \"%s\" &", Xfontname);
data/xfractint-20.4.10/unix/unixscr.c:2514:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(cmd);
data/xfractint-20.4.10/unix/unixscr.c:2546:2:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execvp(shell, argv);
data/xfractint-20.4.10/common/ant.c:433:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(rseed);
data/xfractint-20.4.10/common/cmdfiles.c:614:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if((p = getenv("TMP")) == NULL)
data/xfractint-20.4.10/common/cmdfiles.c:615:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      p = getenv("TEMP");
data/xfractint-20.4.10/common/evolve.c:909:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
 srand(this_gen_rseed);
data/xfractint-20.4.10/common/fractint.c:255:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(this_gen_rseed);
data/xfractint-20.4.10/common/fractint.c:261:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   fract_dir1 = getenv("FRACTDIR");
data/xfractint-20.4.10/common/fractint.c:295:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv("NO87")) fpu = 0;
data/xfractint-20.4.10/common/intro.c:77:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand((unsigned int)clock_ticks());
data/xfractint-20.4.10/common/lorenz.c:2172:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(1);
data/xfractint-20.4.10/common/lorenz.c:2292:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(1);
data/xfractint-20.4.10/common/lorenz.c:2377:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(1);
data/xfractint-20.4.10/common/miscfrac.c:371:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(rseed);
data/xfractint-20.4.10/common/miscfrac.c:531:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(rseed);
data/xfractint-20.4.10/common/miscfrac.c:1547:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(rseed);
data/xfractint-20.4.10/common/miscovl.c:1528:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if ((comspec = getenv("COMSPEC")) == NULL)
data/xfractint-20.4.10/common/parser.c:454:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand(Seed);
data/xfractint-20.4.10/common/parser.c:469:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand((unsigned int)ltime);
data/xfractint-20.4.10/common/prompts1.c:27:9:  [3] (buffer) getwd:
  This does not protect against buffer overflows by itself, so use with
  caution (CWE-120, CWE-20). Use getcwd instead.
#define getwd(a) getcwd(a,MAXPATHLEN)
data/xfractint-20.4.10/common/prompts1.c:32:9:  [3] (buffer) getwd:
  This does not protect against buffer overflows by itself, so use with
  caution (CWE-120, CWE-20). Use getcwd instead.
#define getwd(a) getcwd(a,MAXPATHLEN)
data/xfractint-20.4.10/common/rotate.c:65:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand((unsigned)time(NULL));         /* randomize things             */
data/xfractint-20.4.10/common/stereo.c:241:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
   srand((unsigned int)ltime);
data/xfractint-20.4.10/common/targa.c:626:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if ((envptr = getenv("TARGA")) == NULL)
data/xfractint-20.4.10/common/targa.c:644:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if ((envptr = getenv("TARGASET")) != NULL) {
data/xfractint-20.4.10/unix/unix.c:283:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    fractdir = getenv("FRACTDIR");
data/xfractint-20.4.10/unix/unixscr.c:2522:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    shell = getenv("SHELL");
data/xfractint-20.4.10/common/3d.c:90:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(mat3,new,sizeof(new));
data/xfractint-20.4.10/common/3d.c:223:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(t,tmp,sizeof(tmp));
data/xfractint-20.4.10/common/3d.c:244:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(s,tmp,sizeof(tmp));
data/xfractint-20.4.10/common/ant.c:43:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg[30];
data/xfractint-20.4.10/common/ant.c:48:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg, "Delay %4ld", *wait);
data/xfractint-20.4.10/common/ant.c:366:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char rule[MAX_ANTS];
data/xfractint-20.4.10/common/ant.c:412:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(rule, "%.17g", param[0]);
data/xfractint-20.4.10/common/bigflt.c:69:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        powerten = atoi(e+1);    /* read in the e (x10^) part */
data/xfractint-20.4.10/common/bigflt.c:175:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(s, "0.0");
data/xfractint-20.4.10/common/bigflt.c:199:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(s, "0.0");
data/xfractint-20.4.10/common/bigflt.c:218:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(s, "0.0");
data/xfractint-20.4.10/common/bigflt.c:2291:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(s, "0.0");
data/xfractint-20.4.10/common/bigflt.c:2322:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(s, "e%d", p);
data/xfractint-20.4.10/common/bigflt.c:2337:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(s, "0.0");
data/xfractint-20.4.10/common/biginit.c:228:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       char msg[80];
data/xfractint-20.4.10/common/biginit.c:229:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       char nmsg[80];
data/xfractint-20.4.10/common/bignum.c:280:23:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            longval = atol(s);
data/xfractint-20.4.10/common/bignum.c:297:19:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        longval = atol(s);
data/xfractint-20.4.10/common/bignumc.c:74:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( r, n, bnlength);
data/xfractint-20.4.10/common/bignumc.c:937:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[80];
data/xfractint-20.4.10/common/bignumc.c:939:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(msg,"%-.22Le",f);
data/xfractint-20.4.10/common/bignumc.c:941:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(msg,"%-.22le",f);
data/xfractint-20.4.10/common/calcfrac.c:2238:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char msg[MSGLEN];
data/xfractint-20.4.10/common/calcfrac.c:2892:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char msg[MSGLEN];
data/xfractint-20.4.10/common/calcfrac.c:2900:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char msg[MSGLEN];
data/xfractint-20.4.10/common/calcfrac.c:3937:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(++tp,tp2,sizeof(*tp));
data/xfractint-20.4.10/common/calcfrac.c:3946:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(++tp,tp2,sizeof(*tp));
data/xfractint-20.4.10/common/calcfrac.c:4042:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(++tp,tp2,sizeof(*tp));
data/xfractint-20.4.10/common/calcfrac.c:4061:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy(++tp,tp2,sizeof(*tp));
data/xfractint-20.4.10/common/cmdfiles.c:58:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char    temp1[256];             /* temporary strings        */
data/xfractint-20.4.10/common/cmdfiles.c:59:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char    readname[FILE_MAX_PATH];/* name of fractal input file */
data/xfractint-20.4.10/common/cmdfiles.c:60:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char    tempdir[FILE_MAX_DIR] = {""}; /* name of temporary directory */
data/xfractint-20.4.10/common/cmdfiles.c:61:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char    workdir[FILE_MAX_DIR] = {""}; /* name of directory for misc files */
data/xfractint-20.4.10/common/cmdfiles.c:62:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char    orgfrmdir[FILE_MAX_DIR] = {""};/*name of directory for orgfrm files*/
data/xfractint-20.4.10/common/cmdfiles.c:63:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char    gifmask[MAX_NAME] = {""};
data/xfractint-20.4.10/common/cmdfiles.c:64:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char    PrintName[FILE_MAX_PATH]={"fract001.ps"}; /* Name for print-to-file */
data/xfractint-20.4.10/common/cmdfiles.c:65:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char    savename[FILE_MAX_PATH]={"fract001"};  /* save files using this name */
data/xfractint-20.4.10/common/cmdfiles.c:66:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char    autoname[FILE_MAX_PATH]={"auto.key"}; /* record auto keystrokes here */
data/xfractint-20.4.10/common/cmdfiles.c:120:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char    colorfile[FILE_MAX_PATH];/* from last <l> <s> or colors=@filename */
data/xfractint-20.4.10/common/cmdfiles.c:156:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char FormFileName[FILE_MAX_PATH];/* file to find (type=)formulas in */
data/xfractint-20.4.10/common/cmdfiles.c:157:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char FormName[ITEMNAMELEN+1];    /* Name of the Formula (if not null) */
data/xfractint-20.4.10/common/cmdfiles.c:158:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char LFileName[FILE_MAX_PATH];   /* file to find (type=)L-System's in */
data/xfractint-20.4.10/common/cmdfiles.c:159:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char LName[ITEMNAMELEN+1];       /* Name of L-System */
data/xfractint-20.4.10/common/cmdfiles.c:160:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char CommandFile[FILE_MAX_PATH]; /* file to find command sets in */
data/xfractint-20.4.10/common/cmdfiles.c:161:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char CommandName[ITEMNAMELEN+1]; /* Name of Command set */
data/xfractint-20.4.10/common/cmdfiles.c:162:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char CommandComment[4][MAXCMT];    /* comments for command set */
data/xfractint-20.4.10/common/cmdfiles.c:163:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char IFSFileName[FILE_MAX_PATH];/* file to find (type=)IFS in */
data/xfractint-20.4.10/common/cmdfiles.c:164:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char IFSName[ITEMNAMELEN+1];    /* Name of the IFS def'n (if not null) */
data/xfractint-20.4.10/common/cmdfiles.c:476:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char string[11]; /* space for "+x.xe-xxxx" */
data/xfractint-20.4.10/common/cmdfiles.c:480:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(string,"%+.1Le", x);
data/xfractint-20.4.10/common/cmdfiles.c:482:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(string,"%+.1le", x);
data/xfractint-20.4.10/common/cmdfiles.c:484:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    p = atoi(string+5);
data/xfractint-20.4.10/common/cmdfiles.c:493:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char    curarg[141];
data/xfractint-20.4.10/common/cmdfiles.c:494:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char    tempstring[101];
data/xfractint-20.4.10/common/cmdfiles.c:505:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((initfile = fopen(tempstring,"r")) != NULL)
data/xfractint-20.4.10/common/cmdfiles.c:520:16:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
               strcat(tempstring,".gif");
data/xfractint-20.4.10/common/cmdfiles.c:521:29:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            if ((initfile = fopen(tempstring,"rb")) != NULL) {
data/xfractint-20.4.10/common/cmdfiles.c:549:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
         if ((initfile = fopen(&curarg[1],"r")) == NULL)
data/xfractint-20.4.10/common/cmdfiles.c:867:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char linebuf[513],*cmdbuf;
data/xfractint-20.4.10/common/cmdfiles.c:963:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmpbuf[11];
data/xfractint-20.4.10/common/cmdfiles.c:1005:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char    variable[21];                /* variable name goes here   */
data/xfractint-20.4.10/common/cmdfiles.c:1010:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char    charval[16];                 /* first character of arg    */
data/xfractint-20.4.10/common/cmdfiles.c:1020:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char    *floatvalstr[16];            /* pointers to float vals */
data/xfractint-20.4.10/common/cmdfiles.c:1146:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char adapter_name[8];          /* entry lenth from VIDEO.ASM */
data/xfractint-20.4.10/common/cmdfiles.c:1152:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
             memcpy(adapter_name , adapter_ptr, 8);
data/xfractint-20.4.10/common/cmdfiles.c:1260:13:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
            strcat(CommandFile,".par");
data/xfractint-20.4.10/common/cmdfiles.c:1731:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            potparam[k] = atoi(value);
data/xfractint-20.4.10/common/cmdfiles.c:2219:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy(PrintName,"fract001.ps");
data/xfractint-20.4.10/common/cmdfiles.c:2283:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      switch (atoi(++value)) {
data/xfractint-20.4.10/common/cmdfiles.c:2942:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char temp_name[MAX_NAME];
data/xfractint-20.4.10/common/cmdfiles.c:2965:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
              || (smooth = atoi(value+1)) < 2
data/xfractint-20.4.10/common/cmdfiles.c:3013:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(olddacbox,dacbox,256*3);
data/xfractint-20.4.10/common/cmdfiles.c:3050:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      if ((k=atoi(++value)) >= 0) Printer_Resolution=k;
data/xfractint-20.4.10/common/cmdfiles.c:3052:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
         if ((k=atoi(++value))> 0) LPTNumber = k;
data/xfractint-20.4.10/common/cmdfiles.c:3071:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg[300];
data/xfractint-20.4.10/common/cmdfiles.c:3177:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char far *modestr[4] =
data/xfractint-20.4.10/common/cmdfiles.c:3181:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg[256];
data/xfractint-20.4.10/common/cmdfiles.c:3182:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char cmd[80];
data/xfractint-20.4.10/common/diskvid.c:125:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[20];
data/xfractint-20.4.10/common/diskvid.c:136:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf,"%d x %d",sxdots,sydots);
data/xfractint-20.4.10/common/diskvid.c:145:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(buf,"%d",colors);
data/xfractint-20.4.10/common/diskvid.c:154:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char far msg[sizeof(o_msg)];
data/xfractint-20.4.10/common/diskvid.c:203:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[50];
data/xfractint-20.4.10/common/diskvid.c:204:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf,"Cache size: %dK\n\n",cache_size);
data/xfractint-20.4.10/common/diskvid.c:325:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[41];
data/xfractint-20.4.10/common/diskvid.c:328:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(buf," reading line %4d",
data/xfractint-20.4.10/common/diskvid.c:380:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[41];
data/xfractint-20.4.10/common/diskvid.c:383:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(buf," writing line %4d",
data/xfractint-20.4.10/common/diskvid.c:654:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[41];
data/xfractint-20.4.10/common/editpal.c:421:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buff[81];
data/xfractint-20.4.10/common/editpal.c:697:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char    t[CURSOR_SIZE],        /* save line segments here */
data/xfractint-20.4.10/common/editpal.c:702:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char    t[CURSOR_SIZE];        /* save line segments here */
data/xfractint-20.4.10/common/editpal.c:703:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char    b[CURSOR_SIZE];
data/xfractint-20.4.10/common/editpal.c:704:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char    l[CURSOR_SIZE];
data/xfractint-20.4.10/common/editpal.c:705:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char    r[CURSOR_SIZE];
data/xfractint-20.4.10/common/editpal.c:2308:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buff[MAX_WIDTH];
data/xfractint-20.4.10/common/editpal.c:2384:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buff[MAX_WIDTH];
data/xfractint-20.4.10/common/editpal.c:2903:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char msg[sizeof(o_msg)];
data/xfractint-20.4.10/common/editpal.c:2905:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char buf[20];
data/xfractint-20.4.10/common/editpal.c:2907:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
              sprintf(buf,"%.3f",1./gamma_val);
data/xfractint-20.4.10/common/encoder.c:74:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmpmsg[41];                 /* before openfile in case of overrun */
data/xfractint-20.4.10/common/encoder.c:75:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char openfile[FILE_MAX_PATH], openfiletype[10];
data/xfractint-20.4.10/common/encoder.c:76:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmpfile[FILE_MAX_PATH];
data/xfractint-20.4.10/common/encoder.c:76:9:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
   char tmpfile[FILE_MAX_PATH];
data/xfractint-20.4.10/common/encoder.c:90:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(openfiletype, ".pot");
data/xfractint-20.4.10/common/encoder.c:102:11:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
   strcpy(tmpfile, openfile);
data/xfractint-20.4.10/common/encoder.c:125:18:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      i = strlen(tmpfile);
data/xfractint-20.4.10/common/encoder.c:126:26:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      while (--i >= 0 && tmpfile[i] != SLASHC)
data/xfractint-20.4.10/common/encoder.c:127:10:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
         tmpfile[i] = 0;
data/xfractint-20.4.10/common/encoder.c:128:18:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      far_strcat(tmpfile, fractint_tmp);
data/xfractint-20.4.10/common/encoder.c:135:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ((g_outfile = fopen(tmpfile, "wb")) == NULL)
data/xfractint-20.4.10/common/encoder.c:135:27:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
   if ((g_outfile = fopen(tmpfile, "wb")) == NULL)
data/xfractint-20.4.10/common/encoder.c:137:37:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      sprintf(tmpmsg, s_cantcreate, tmpfile);
data/xfractint-20.4.10/common/encoder.c:144:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[61];
data/xfractint-20.4.10/common/encoder.c:160:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char cmd[256];
data/xfractint-20.4.10/common/encoder.c:186:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[200];
data/xfractint-20.4.10/common/encoder.c:196:17:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
         unlink(tmpfile);
data/xfractint-20.4.10/common/encoder.c:203:14:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
      rename(tmpfile, openfile);/* earlier with access              */
data/xfractint-20.4.10/common/encoder.c:249:27:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
         extract_filename(tmpfile, openfile);
data/xfractint-20.4.10/common/encoder.c:250:48:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
         sprintf(tmpmsg, " File saved as %s ", tmpfile);
data/xfractint-20.4.10/common/encoder.c:603:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char header[15];
data/xfractint-20.4.10/common/encoder.c:604:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(header, "!\377\013fractint");
data/xfractint-20.4.10/common/encoder.c:605:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(&header[11], "%03u", block_id);
data/xfractint-20.4.10/common/encoder.c:921:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char accum_stack[256];
data/xfractint-20.4.10/common/evolve.c:379:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hdg[sizeof(o_hdg)];
data/xfractint-20.4.10/common/evolve.c:380:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char far *choices[20];
data/xfractint-20.4.10/common/evolve.c:477:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hdg[sizeof(o_hdg)];
data/xfractint-20.4.10/common/evolve.c:478:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char far *choices[20];
data/xfractint-20.4.10/common/evolve.c:618:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char hdg[sizeof(o_hdg)];
data/xfractint-20.4.10/common/evolve.c:619:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char far *choices[20];
data/xfractint-20.4.10/common/f16.c:33:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char rlebuf[258];    /* RLE-state variables */
data/xfractint-20.4.10/common/f16.c:47:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[64];
data/xfractint-20.4.10/common/f16.c:53:36:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (has_ext(filename) == NULL) strcat(filename, ".TGA");
data/xfractint-20.4.10/common/f16.c:54:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(filename, READMODE)) == NULL) return NULL;
data/xfractint-20.4.10/common/fracsubr.c:549:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[30];
data/xfractint-20.4.10/common/fracsubr.c:551:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(buf,"%.9g",(double)l / fudge);
data/xfractint-20.4.10/common/fracsubr.c:1333:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((snd_fp = fopen(soundname,"w"))==NULL)
data/xfractint-20.4.10/common/fractalb.c:35:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char msg[200];
data/xfractint-20.4.10/common/fractalb.c:45:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg[400];
data/xfractint-20.4.10/common/fractalb.c:61:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg[100],msg1[100],msg3[100];
data/xfractint-20.4.10/common/fractalb.c:89:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg[300];
data/xfractint-20.4.10/common/fractalb.c:104:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg[100],msg1[100],msg3[600];
data/xfractint-20.4.10/common/fractalb.c:134:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg[100],msg1[100],msg3[500];
data/xfractint-20.4.10/common/fractalb.c:161:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg1[200],msg2[200], msg3[400];
data/xfractint-20.4.10/common/fractalb.c:171:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg1[200],msg2[200], msg3[200], msg4[600];
data/xfractint-20.4.10/common/fractalb.c:184:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg[100],str[100];
data/xfractint-20.4.10/common/fractalb.c:206:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg[100],msg1[100];
data/xfractint-20.4.10/common/fractalb.c:216:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg[300],msg1[300];
data/xfractint-20.4.10/common/fractalb.c:226:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char msg[200];
data/xfractint-20.4.10/common/fractint.c:173:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char file_name_stack[16][MAX_NAME]; /* array of file names used while browsing */
data/xfractint-20.4.10/common/fractint.c:180:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char browsemask[MAX_NAME];
data/xfractint-20.4.10/common/fractint.c:191:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char drive[FILE_MAX_DRIVE];
data/xfractint-20.4.10/common/fractint.c:192:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char dir[FILE_MAX_DIR];
data/xfractint-20.4.10/common/fractint.c:193:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char fname[FILE_MAX_FNAME];
data/xfractint-20.4.10/common/fractint.c:194:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char ext[FILE_MAX_EXT];
data/xfractint-20.4.10/common/fractint.c:195:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char path[FILE_MAX_PATH];
data/xfractint-20.4.10/common/fractint.c:241:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(browsemask,"*.gif");
data/xfractint-20.4.10/common/fractint.c:242:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(browsename,"            ");
data/xfractint-20.4.10/common/fractint.c:283:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(olddacbox,dacbox,256*3);      /* save in case colors= present */
data/xfractint-20.4.10/common/fractint.c:337:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dacbox,olddacbox,256*3);   /* restore in case colors= present */
data/xfractint-20.4.10/common/fractint.c:472:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(olddacbox,dacbox,256*3);     /* save in case colors= present */
data/xfractint-20.4.10/common/framain2.c:97:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(olddacbox,dacbox,256*3); /* save the DAC */
data/xfractint-20.4.10/common/framain2.c:132:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char buf[120];
data/xfractint-20.4.10/common/framain2.c:137:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                  sprintf(buf,"%Fs\n%Fs",(char far *)msgxy1,(char far *)msgxy2);
data/xfractint-20.4.10/common/framain2.c:158:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(dacbox,olddacbox,256*3); /* restore the DAC */
data/xfractint-20.4.10/common/framain2.c:270:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char msg[MSGLEN];
data/xfractint-20.4.10/common/framain2.c:271:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(msg,"floatflag=%d",usr_floatflag);
data/xfractint-20.4.10/common/framain2.c:456:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char msg[sizeof(o_msg)];
data/xfractint-20.4.10/common/framain2.c:1088:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(olddacbox, dacbox, 256 * 3);
data/xfractint-20.4.10/common/framain2.c:1111:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(olddacbox, dacbox, 256 * 3);
data/xfractint-20.4.10/common/framain2.c:1541:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(olddacbox, dacbox, 256 * 3);
data/xfractint-20.4.10/common/framain2.c:1563:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(olddacbox, dacbox, 256 * 3);
data/xfractint-20.4.10/common/frasetup.c:698:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char far fnplusfn[7][7] =
data/xfractint-20.4.10/common/frasetup.c:946:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char far fnxfn[7][7] =
data/xfractint-20.4.10/common/gifview.c:74:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char temp1[FILE_MAX_DIR];
data/xfractint-20.4.10/common/gifview.c:83:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char msg[100];
data/xfractint-20.4.10/common/gifview.c:84:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg,"Stack free in gifview: %d",stackavail());
data/xfractint-20.4.10/common/gifview.c:104:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((fpin = fopen(temp1,"rb")) != NULL) {
data/xfractint-20.4.10/common/gifview.c:115:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ((fpin = fopen(temp1, "rb")) == NULL) {
data/xfractint-20.4.10/common/gifview.c:181:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char fname[FILE_MAX_FNAME];
data/xfractint-20.4.10/common/gifview.c:182:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char ext[FILE_MAX_EXT];
data/xfractint-20.4.10/common/gifview.c:183:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tmpname[MAX_NAME];
data/xfractint-20.4.10/common/gifview.c:184:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char msg[40];
data/xfractint-20.4.10/common/gifview.c:315:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char msg[sizeof(o_msg)];
data/xfractint-20.4.10/common/help.c:371:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char temp[9];
data/xfractint-20.4.10/common/help.c:377:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(temp, "%2d of %d", page+1, num_pages);
data/xfractint-20.4.10/common/help.c:603:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char      title[81];
data/xfractint-20.4.10/common/help.c:945:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ( (handle=open(path, O_RDONLY|O_DENYWRITE)) != -1)
data/xfractint-20.4.10/common/help.c:947:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ( (handle=open(path, O_RDONLY)) != -1)
data/xfractint-20.4.10/common/help.c:1081:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char      id[81];        /* buffer to store id in */
data/xfractint-20.4.10/common/help.c:1082:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char      title[81];     /* buffer to store title in */
data/xfractint-20.4.10/common/help.c:1221:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char line[81];
data/xfractint-20.4.10/common/help.c:1222:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char buff[40];
data/xfractint-20.4.10/common/help.c:1234:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(buff, "Fractint Version %d.%01d%c",release/100, (release%100)/10,
data/xfractint-20.4.10/common/help.c:1238:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(buff, "Page %d", pd->pnum);
data/xfractint-20.4.10/common/help.c:1290:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char temp[10];
data/xfractint-20.4.10/common/help.c:1324:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(temp, "%d%%", (int)( (100.0 / num_pages) * pnum ) );
data/xfractint-20.4.10/common/help.c:1379:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ( (temp_file=open(TEMP_FILE_NAME, O_RDWR|O_CREAT|O_TRUNC|O_BINARY, S_IREAD|S_IWRITE)) == -1 )
data/xfractint-20.4.10/common/help.c:1392:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ( (info.file = fopen(outfname, "wt")) == NULL )
data/xfractint-20.4.10/common/help.c:1442:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char   path[FILE_MAX_PATH+1];
data/xfractint-20.4.10/common/help.c:1461:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     if ( (help_file = open(path, O_RDONLY|O_BINARY|O_DENYWRITE)) != -1 )
data/xfractint-20.4.10/common/help.c:1463:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     if ( (help_file = open(path, O_RDONLY|O_BINARY)) != -1 )
data/xfractint-20.4.10/common/help.c:1512:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ( (help_file = open(path, O_RDONLY|O_BINARY|O_DENYWRITE)) != -1 )
data/xfractint-20.4.10/common/help.c:1514:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ( (help_file = open(path, O_RDONLY|O_BINARY)) != -1 )
data/xfractint-20.4.10/common/jiim.c:434:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buff[MAXRECT];
data/xfractint-20.4.10/common/jiim.c:462:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buff[MAXRECT];
data/xfractint-20.4.10/common/jiim.c:884:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char str[41];
data/xfractint-20.4.10/common/jiim.c:885:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(str,"%16.14f %16.14f %3d",cr,ci,getcolor(col,row));
data/xfractint-20.4.10/common/line3d.c:130:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char light_name[FILE_MAX_PATH] = "fract001";
data/xfractint-20.4.10/common/line3d.c:132:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char targa_temp[MAX_NAME] = "fractemp.tga";
data/xfractint-20.4.10/common/line3d.c:135:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ray_name[FILE_MAX_PATH] = "fract001";
data/xfractint-20.4.10/common/line3d.c:283:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char s[40];
data/xfractint-20.4.10/common/line3d.c:285:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(s, "%Fs%d", (char far *)mapping, currow);
data/xfractint-20.4.10/common/line3d.c:1369:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msgbuf[200];
data/xfractint-20.4.10/common/line3d.c:1795:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ((File_Ptr1 = fopen(ray_name, "w")) == NULL)
data/xfractint-20.4.10/common/line3d.c:2031:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                 (char far *)texture,
data/xfractint-20.4.10/common/line3d.c:2032:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                 (char far *)s_color,
data/xfractint-20.4.10/common/line3d.c:2033:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                 (char far *)red,   c[0],
data/xfractint-20.4.10/common/line3d.c:2034:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                 (char far *)green, c[1],
data/xfractint-20.4.10/common/line3d.c:2035:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                 (char far *)blue,  c[2],
data/xfractint-20.4.10/common/line3d.c:2146:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         fprintf(File_Ptr1, fmt, (char far *)plane, (char far *)one, (char far *)z, (char far *)z, max_xyz[0], (char far *)end, (char far *)plane);
data/xfractint-20.4.10/common/line3d.c:2146:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         fprintf(File_Ptr1, fmt, (char far *)plane, (char far *)one, (char far *)z, (char far *)z, max_xyz[0], (char far *)end, (char far *)plane);
data/xfractint-20.4.10/common/line3d.c:2146:71:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         fprintf(File_Ptr1, fmt, (char far *)plane, (char far *)one, (char far *)z, (char far *)z, max_xyz[0], (char far *)end, (char far *)plane);
data/xfractint-20.4.10/common/line3d.c:2146:86:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         fprintf(File_Ptr1, fmt, (char far *)plane, (char far *)one, (char far *)z, (char far *)z, max_xyz[0], (char far *)end, (char far *)plane);
data/xfractint-20.4.10/common/line3d.c:2148:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         fprintf(File_Ptr1, fmt, (char far *)plane, (char far *)z, (char far *)one, (char far *)z, max_xyz[1], (char far *)end, (char far *)plane);
data/xfractint-20.4.10/common/line3d.c:2148:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         fprintf(File_Ptr1, fmt, (char far *)plane, (char far *)z, (char far *)one, (char far *)z, max_xyz[1], (char far *)end, (char far *)plane);
data/xfractint-20.4.10/common/line3d.c:2148:69:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         fprintf(File_Ptr1, fmt, (char far *)plane, (char far *)z, (char far *)one, (char far *)z, max_xyz[1], (char far *)end, (char far *)plane);
data/xfractint-20.4.10/common/line3d.c:2148:86:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         fprintf(File_Ptr1, fmt, (char far *)plane, (char far *)z, (char far *)one, (char far *)z, max_xyz[1], (char far *)end, (char far *)plane);
data/xfractint-20.4.10/common/line3d.c:2150:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         fprintf(File_Ptr1, fmt, (char far *)plane, (char far *)z, (char far *)z, (char far *)one, max_xyz[2], (char far *)end, (char far *)plane);
data/xfractint-20.4.10/common/line3d.c:2150:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         fprintf(File_Ptr1, fmt, (char far *)plane, (char far *)z, (char far *)z, (char far *)one, max_xyz[2], (char far *)end, (char far *)plane);
data/xfractint-20.4.10/common/line3d.c:2150:69:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         fprintf(File_Ptr1, fmt, (char far *)plane, (char far *)z, (char far *)z, (char far *)one, max_xyz[2], (char far *)end, (char far *)plane);
data/xfractint-20.4.10/common/line3d.c:2150:84:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         fprintf(File_Ptr1, fmt, (char far *)plane, (char far *)z, (char far *)z, (char far *)one, max_xyz[2], (char far *)end, (char far *)plane);
data/xfractint-20.4.10/common/line3d.c:2715:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tmpmsg[70];
data/xfractint-20.4.10/common/line3d.c:2718:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(tmpmsg, "used %ld%Fs", check_extra, (char far *)extramsg);
data/xfractint-20.4.10/common/loadfdos.c:82:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char kname[5];
data/xfractint-20.4.10/common/loadfdos.c:148:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char over[25]; /* overwrite comments with original resolutions */
data/xfractint-20.4.10/common/loadfdos.c:159:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(over,"<-VIRTUAL! at %4u x %4u",vident->xdots,vident->ydots);
data/xfractint-20.4.10/common/loadfdos.c:255:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy(temp1,"      Non-fractal GIF");
data/xfractint-20.4.10/common/loadfdos.c:271:13:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
            strcat((char *)dstack,"WinFract ");
data/xfractint-20.4.10/common/loadfdos.c:272:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(temp1,"v%d.%01d",save_release/100,(save_release%100)/10);
data/xfractint-20.4.10/common/loadfdos.c:279:13:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
            strcat(temp1," or earlier");
data/xfractint-20.4.10/common/loadfdos.c:285:13:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
            strcat((char *)dstack,"Saved in unknown video mode.");
data/xfractint-20.4.10/common/loadfdos.c:296:10:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
         strcat(temp1,"TAB for fractal information, ");
data/xfractint-20.4.10/common/loadfdos.c:297:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(temp1,"ESCAPE to back out.");
data/xfractint-20.4.10/common/loadfdos.c:438:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char errbuf[10];
data/xfractint-20.4.10/common/loadfile.c:43:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg[110];
data/xfractint-20.4.10/common/loadfile.c:58:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(readname,".gif");
data/xfractint-20.4.10/common/loadfile.c:544:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char temp1[81];
data/xfractint-20.4.10/common/loadfile.c:561:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if((fp = fopen(gif_file,"rb"))==NULL)
data/xfractint-20.4.10/common/loadfile.c:637:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tmpbuf[110];
data/xfractint-20.4.10/common/loadfile.c:673:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            block_type = atoi(&temp1[10]); /* e.g. "fractint002" */
data/xfractint-20.4.10/common/loadfile.c:806:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   strcpy(info->info_id, "GIFFILE");
data/xfractint-20.4.10/common/loadfile.c:1129:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     char name[MAX_NAME];     /* for filename */
data/xfractint-20.4.10/common/loadfile.c:1145:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char browsename[MAX_NAME]; /* name for browse file */
data/xfractint-20.4.10/common/loadfile.c:1169:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mesg[40],newname[60],oldname[60];
data/xfractint-20.4.10/common/loadfile.c:1172:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char drive[FILE_MAX_DRIVE];
data/xfractint-20.4.10/common/loadfile.c:1173:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dir[FILE_MAX_DIR];
data/xfractint-20.4.10/common/loadfile.c:1174:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fname[FILE_MAX_FNAME];
data/xfractint-20.4.10/common/loadfile.c:1175:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ext[FILE_MAX_EXT];
data/xfractint-20.4.10/common/loadfile.c:1176:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpmask[FILE_MAX_PATH];
data/xfractint-20.4.10/common/loadfile.c:1398:11:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
          strcat(mesg,"Delete ");
data/xfractint-20.4.10/common/loadfile.c:1400:11:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
          strcat(mesg,"? (Y/N)");
data/xfractint-20.4.10/common/loadmap.c:50:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char    line[160];
data/xfractint-20.4.10/common/loadmap.c:51:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char    temp[FILE_MAX_PATH+1];
data/xfractint-20.4.10/common/loadmap.c:52:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char    temp_fn[FILE_MAX_PATH];
data/xfractint-20.4.10/common/loadmap.c:63:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                strcat(temp,".map");  /* No? Then add .map */
data/xfractint-20.4.10/common/loadmap.c:65:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        f = fopen( line, "r" );
data/xfractint-20.4.10/common/loadmap.c:109:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char msg[sizeof(o_msg)];
data/xfractint-20.4.10/common/lorenz.c:2785:31:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ((orbitsave&1) && (fp = fopen(orbitsavename,"w")) != NULL)
data/xfractint-20.4.10/common/lsys.c:61:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char far *ruleptrs[MAXRULES];
data/xfractint-20.4.10/common/lsys.c:74:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char numstr[30];
data/xfractint-20.4.10/common/lsys.c:128:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char inline1[MAX_LSYS_LINE_LEN+1],fixed[MAX_LSYS_LINE_LEN+1],*word;
data/xfractint-20.4.10/common/lsys.c:130:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msgbuf[481]; /* enough for 6 full lines */
data/xfractint-20.4.10/common/lsys.c:163:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            maxangle=(char)atoi(strtok(NULL," \t\n"));
data/xfractint-20.4.10/common/memory.c:46:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char memstr[6][9] = {"nowhere", "extraseg", "far", "expanded",
data/xfractint-20.4.10/common/memory.c:51:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char memstr[3][9] = {{"nowhere"}, {"far"}, {"disk"}};
data/xfractint-20.4.10/common/memory.c:172:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char buf[MSGLEN];
data/xfractint-20.4.10/common/memory.c:173:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char nmsg[MSGLEN];
data/xfractint-20.4.10/common/memory.c:236:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[MSGLEN*2];
data/xfractint-20.4.10/common/memory.c:237:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char nmsg[MSGLEN*2];
data/xfractint-20.4.10/common/memory.c:390:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[MSGLEN];
data/xfractint-20.4.10/common/memory.c:391:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char nmsg[MSGLEN];
data/xfractint-20.4.10/common/memory.c:416:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[MSGLEN];
data/xfractint-20.4.10/common/memory.c:417:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char nmsg[MSGLEN];
data/xfractint-20.4.10/common/memory.c:458:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[MSGLEN];
data/xfractint-20.4.10/common/memory.c:459:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char nmsg[MSGLEN];
data/xfractint-20.4.10/common/memory.c:640:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[MSGLEN];
data/xfractint-20.4.10/common/memory.c:641:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char nmsg[MSGLEN];
data/xfractint-20.4.10/common/miscfrac.c:1406:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char msg[30];
data/xfractint-20.4.10/common/miscfrac.c:1407:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(msg,"Bad t=%d, aborting\n", t);
data/xfractint-20.4.10/common/miscfrac.c:1470:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      farmemfree((char far *)cell_array[0]);
data/xfractint-20.4.10/common/miscfrac.c:1476:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      farmemfree((char far *)cell_array[1]);
data/xfractint-20.4.10/common/miscfrac.c:1491:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[30];
data/xfractint-20.4.10/common/miscfrac.c:1529:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf,"%.16g",n); /* # of digits in initial string */
data/xfractint-20.4.10/common/miscfrac.c:1570:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(buf,"%.*g",rule_digits ,n);
data/xfractint-20.4.10/common/miscovl.c:56:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char far par_comment[4][MAXCMT];
data/xfractint-20.4.10/common/miscovl.c:100:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char vidmde[5];
data/xfractint-20.4.10/common/miscovl.c:108:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char far *inpcomment[4];
data/xfractint-20.4.10/common/miscovl.c:110:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char far * choices[MAXPROMPTS];
data/xfractint-20.4.10/common/miscovl.c:113:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char outname[FILE_MAX_PATH+1], buf[256], buf2[128];
data/xfractint-20.4.10/common/miscovl.c:116:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char colorspec[MAX_NAME+1];
data/xfractint-20.4.10/common/miscovl.c:134:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   ptr = (char far *)(inpcomment[3] + MAXCMT);
data/xfractint-20.4.10/common/miscovl.c:277:10:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
         strcat(CommandFile, ".par");   /* default extension .par */
data/xfractint-20.4.10/common/miscovl.c:366:10:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
         strcat(outname, "fractint.tmp");
data/xfractint-20.4.10/common/miscovl.c:367:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
         infile = fopen(CommandFile, "rt");
data/xfractint-20.4.10/common/miscovl.c:372:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((parmfile = fopen(outname, "wt")) == NULL)
data/xfractint-20.4.10/common/miscovl.c:440:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char PCommandName[80];
data/xfractint-20.4.10/common/miscovl.c:452:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char buf[20];
data/xfractint-20.4.10/common/miscovl.c:453:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(buf,"_%c%c",PAR_KEY(i),PAR_KEY(j));
data/xfractint-20.4.10/common/miscovl.c:492:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[25];
data/xfractint-20.4.10/common/miscovl.c:563:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[81];
data/xfractint-20.4.10/common/miscovl.c:1488:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{  char buf[40];
data/xfractint-20.4.10/common/miscovl.c:1499:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(bptr,"%1.*Lg",prec,(long double)fnum);
data/xfractint-20.4.10/common/miscovl.c:1502:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(bptr,"%1.*g",prec,(double)fnum);
data/xfractint-20.4.10/common/miscovl.c:1527:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char curdir[FILE_MAX_DIR],*s;
data/xfractint-20.4.10/common/miscovl.c:1566:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char adapter_name[8];        /* entry lenth from VIDEO.ASM */
data/xfractint-20.4.10/common/miscovl.c:1576:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
       memcpy(adapter_name , adapter_ptr, 8);
data/xfractint-20.4.10/common/miscovl.c:1703:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char hdg2[sizeof(o_hdg2)];
data/xfractint-20.4.10/common/miscovl.c:1704:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char hdg1[sizeof(o_hdg1)];
data/xfractint-20.4.10/common/miscovl.c:1821:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char local_buf[81];
data/xfractint-20.4.10/common/miscovl.c:1822:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char kname[5];
data/xfractint-20.4.10/common/miscovl.c:1896:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char cfgname[100],outname[100],buf[121],kname[5];
data/xfractint-20.4.10/common/miscovl.c:1913:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(outname,"fractint.tmp");
data/xfractint-20.4.10/common/miscovl.c:1914:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ((outfile = fopen(outname,"w")) == NULL) {
data/xfractint-20.4.10/common/miscovl.c:1919:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   cfgfile = fopen(cfgname,"r");
data/xfractint-20.4.10/common/miscovl.c:1926:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char colorsbuf[10];
data/xfractint-20.4.10/common/miscovl.c:1943:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(colorsbuf,"%3d",vident.colors);
data/xfractint-20.4.10/common/miscovl.c:1995:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char gifin[15], gifout[15];
data/xfractint-20.4.10/common/miscovl.c:1999:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char msgbuf[81];
data/xfractint-20.4.10/common/miscovl.c:2006:1:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
strcpy(gifout,"fractmig.gif");
data/xfractint-20.4.10/common/miscovl.c:2025:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((out = fopen(gifout,"wb")) == NULL) {
data/xfractint-20.4.10/common/miscovl.c:2032:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(gifin, "frmig_%c%c.gif", PAR_KEY(xstep), PAR_KEY(ystep));
data/xfractint-20.4.10/common/miscovl.c:2034:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if ((in = fopen(gifin,"rb")) == NULL) {
data/xfractint-20.4.10/common/miscovl.c:2044:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&xres, &temp[6], 2);     /* X-resolution */
data/xfractint-20.4.10/common/miscovl.c:2045:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&yres, &temp[8], 2);     /* Y-resolution */
data/xfractint-20.4.10/common/miscovl.c:2052:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&temp[6], &xtot, 2);
data/xfractint-20.4.10/common/miscovl.c:2053:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&temp[8], &ytot, 2);
data/xfractint-20.4.10/common/miscovl.c:2095:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&xloc, &temp[1], 2); /* X-location */
data/xfractint-20.4.10/common/miscovl.c:2096:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&yloc, &temp[3], 2); /* Y-location */
data/xfractint-20.4.10/common/miscovl.c:2099:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&temp[1], &xloc, 2);
data/xfractint-20.4.10/common/miscovl.c:2100:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&temp[3], &yloc, 2);
data/xfractint-20.4.10/common/miscovl.c:2202:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(gifin, "frmig_%c%c.gif", PAR_KEY(xstep), PAR_KEY(ystep));
data/xfractint-20.4.10/common/miscovl.c:2395:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(out,", ");
data/xfractint-20.4.10/common/miscovl.c:2405:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf,"%d",release);
data/xfractint-20.4.10/common/miscovl.c:2410:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf,"%d",patchlevel);
data/xfractint-20.4.10/common/miscovl.c:2415:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf,"%d",xdots);
data/xfractint-20.4.10/common/miscovl.c:2420:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf,"%d",ydots);
data/xfractint-20.4.10/common/miscovl.c:2425:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char vidmde[5];
data/xfractint-20.4.10/common/miscovl.c:2449:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char c, oldc, varname[MAXVNAME];
data/xfractint-20.4.10/common/miscovl.c:2473:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char buf[100];
data/xfractint-20.4.10/common/miscres.c:45:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fname[FILE_MAX_FNAME];
data/xfractint-20.4.10/common/miscres.c:46:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ext[FILE_MAX_EXT];
data/xfractint-20.4.10/common/miscres.c:47:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char temp_path[FILE_MAX_PATH];
data/xfractint-20.4.10/common/miscres.c:522:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char drive[FILE_MAX_DRIVE];
data/xfractint-20.4.10/common/miscres.c:523:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char dir[FILE_MAX_DIR];
data/xfractint-20.4.10/common/miscres.c:524:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fname[FILE_MAX_FNAME];
data/xfractint-20.4.10/common/miscres.c:525:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ext[FILE_MAX_EXT];
data/xfractint-20.4.10/common/miscres.c:546:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(save,"%ld",atol(hold)+1); /* increment the number */
data/xfractint-20.4.10/common/miscres.c:546:23:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   sprintf(save,"%ld",atol(hold)+1); /* increment the number */
data/xfractint-20.4.10/common/miscres.c:553:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char openfile[FILE_MAX_DIR];
data/xfractint-20.4.10/common/miscres.c:554:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char opentype[20];
data/xfractint-20.4.10/common/miscres.c:609:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmpbuf[30];
data/xfractint-20.4.10/common/miscres.c:619:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmpbuf[20];
data/xfractint-20.4.10/common/miscres.c:641:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char trigname[10];
data/xfractint-20.4.10/common/miscres.c:759:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg,"%3ld:%02ld:%02ld.%02ld", ctime/360000L,
data/xfractint-20.4.10/common/miscres.c:786:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(msg,"Version %d patch %d",release, patchlevel);
data/xfractint-20.4.10/common/miscres.c:788:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(msg,"%lu bytes conventional stack free",stackavail());
data/xfractint-20.4.10/common/miscres.c:790:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(msg,"%ld of %ld bignum memory used",maxptr,maxstack);
data/xfractint-20.4.10/common/miscres.c:792:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(msg,"   %ld used for bignum globals", startstack);
data/xfractint-20.4.10/common/miscres.c:794:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(msg,"   %ld stack used == %ld variables of length %d",
data/xfractint-20.4.10/common/miscres.c:799:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg,"intlength %-d bflength %-d ",intlength, bflength);
data/xfractint-20.4.10/common/miscres.c:814:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(msg,"Sizeof fractalspecific array %d",
data/xfractint-20.4.10/common/miscres.c:817:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(msg,"calc_status %d pixel [%d,%d]",calc_status,col,row);
data/xfractint-20.4.10/common/miscres.c:821:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(msg,"total_formula_mem %ld Max_Ops (posp) %u Max_Args (vsp) %u Used_extra %u",
data/xfractint-20.4.10/common/miscres.c:824:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(msg,"   Store ptr %d Loadptr %d Max_Ops var %u Max_Args var %u LastInitOp %d",
data/xfractint-20.4.10/common/miscres.c:830:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(msg,"SOI Recursion %d stack free %d %d %d %d %d %d %d %d %d %d",
data/xfractint-20.4.10/common/miscres.c:863:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg,"minstackavail %d llimit2 %ld use_grid %d",
data/xfractint-20.4.10/common/miscres.c:874:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg,"%d      ",key);
data/xfractint-20.4.10/common/miscres.c:889:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg[350];
data/xfractint-20.4.10/common/miscres.c:1015:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
       sprintf(msg,"(%-d decimals)",decimals /*getprecbf(CURRENTREZ)*/);
data/xfractint-20.4.10/common/miscres.c:1040:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(msg,"%d Pass Mode",totpasses);
data/xfractint-20.4.10/common/miscres.c:1054:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(msg,"Processing row %d (of %d) of input image",currow,fileydots);
data/xfractint-20.4.10/common/miscres.c:1069:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(msg,"%2.2f%% done, counter at %lu of %lu (%u bits)",
data/xfractint-20.4.10/common/miscres.c:1076:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(msg,"Working on block (y,x) [%d,%d]...[%d,%d], ",
data/xfractint-20.4.10/common/miscres.c:1081:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(msg,"[%d,%d]",currow,curcol);
data/xfractint-20.4.10/common/miscres.c:1087:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(msg,"%d",curpass);
data/xfractint-20.4.10/common/miscres.c:1090:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
               sprintf(msg,"%d",totpasses);
data/xfractint-20.4.10/common/miscres.c:1095:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(msg,"%d",currow);
data/xfractint-20.4.10/common/miscres.c:1098:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(msg,"%d",col);
data/xfractint-20.4.10/common/miscres.c:1115:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg," %ld of %ld",coloriter-2,maxct);
data/xfractint-20.4.10/common/miscres.c:1154:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg,"%10.8Le",Magnification);
data/xfractint-20.4.10/common/miscres.c:1156:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg,"%10.8le",Magnification);
data/xfractint-20.4.10/common/miscres.c:1160:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg,"%11.4f   ",Xmagfactor);
data/xfractint-20.4.10/common/miscres.c:1163:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg,"%9.3f   ",Rotation);
data/xfractint-20.4.10/common/miscres.c:1166:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg,"%9.3f",Skew);
data/xfractint-20.4.10/common/miscres.c:1173:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg,"%20.16f  %20.16f",xxmin,yymax);
data/xfractint-20.4.10/common/miscres.c:1176:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg,"%20.16f  %20.16f",xxmax,yymin);
data/xfractint-20.4.10/common/miscres.c:1182:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(msg,"%20.16f  %20.16f",xx3rd,yy3rd);
data/xfractint-20.4.10/common/miscres.c:1187:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg,"%20.16f %20.16f  ",Xctr,Yctr);
data/xfractint-20.4.10/common/miscres.c:1191:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg," %10.8Le",Magnification);
data/xfractint-20.4.10/common/miscres.c:1193:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg," %10.8le",Magnification);
data/xfractint-20.4.10/common/miscres.c:1197:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg,"%11.4f   ",Xmagfactor);
data/xfractint-20.4.10/common/miscres.c:1200:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg,"%9.3f   ",Rotation);
data/xfractint-20.4.10/common/miscres.c:1203:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg,"%9.3f",Skew);
data/xfractint-20.4.10/common/miscres.c:1213:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char p[50];
data/xfractint-20.4.10/common/miscres.c:1225:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(msg,"%3d: ",i+1);
data/xfractint-20.4.10/common/miscres.c:1228:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(msg,"%-12d",(int)param[i]);
data/xfractint-20.4.10/common/miscres.c:1230:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(msg,"%-12lu",(U32)param[i]);
data/xfractint-20.4.10/common/miscres.c:1232:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(msg,"%-12.9f",param[i]);
data/xfractint-20.4.10/common/miscres.c:1238:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(msg,"%ld (%ld)",coloriter,maxit);
data/xfractint-20.4.10/common/miscres.c:1241:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(msg,"%f",rqlim);
data/xfractint-20.4.10/common/miscres.c:1246:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg,"%d",rseed);
data/xfractint-20.4.10/common/miscres.c:1252:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg,"%12.9f",f_radius);
data/xfractint-20.4.10/common/miscres.c:1255:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg,"%12.9f",f_xcenter);
data/xfractint-20.4.10/common/miscres.c:1258:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msg,"%12.9f",f_ycenter);
data/xfractint-20.4.10/common/miscres.c:1302:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[160];
data/xfractint-20.4.10/common/miscres.c:1322:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf,"%Fs%ld inside pixels of %ld%Fs%f",
data/xfractint-20.4.10/common/miscres.c:1368:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[201];
data/xfractint-20.4.10/common/miscres.c:1457:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char parsearchname[ITEMNAMELEN + 6];
data/xfractint-20.4.10/common/miscres.c:1458:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char drive[FILE_MAX_DRIVE];
data/xfractint-20.4.10/common/miscres.c:1459:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char dir[FILE_MAX_DIR];
data/xfractint-20.4.10/common/miscres.c:1460:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fname[FILE_MAX_FNAME];
data/xfractint-20.4.10/common/miscres.c:1461:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ext[FILE_MAX_EXT];
data/xfractint-20.4.10/common/miscres.c:1462:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fullpath[FILE_MAX_PATH];
data/xfractint-20.4.10/common/miscres.c:1463:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char defaultextension[FILE_MAX_EXT];
data/xfractint-20.4.10/common/miscres.c:1469:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((infile=fopen(filename, "rb")) != NULL) {
data/xfractint-20.4.10/common/miscres.c:1481:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
         if((infile=fopen(fullpath, "rb")) != NULL) {
data/xfractint-20.4.10/common/miscres.c:1496:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy(parsearchname, "frm:");
data/xfractint-20.4.10/common/miscres.c:1499:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy(defaultextension, ".frm");
data/xfractint-20.4.10/common/miscres.c:1503:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy(parsearchname, "lsys:");
data/xfractint-20.4.10/common/miscres.c:1506:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy(defaultextension, ".l");
data/xfractint-20.4.10/common/miscres.c:1510:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy(parsearchname, "ifs:");
data/xfractint-20.4.10/common/miscres.c:1513:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy(defaultextension, ".ifs");
data/xfractint-20.4.10/common/miscres.c:1519:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy(defaultextension, ".par");
data/xfractint-20.4.10/common/miscres.c:1525:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((infile=fopen(CommandFile, "rb")) != NULL) {
data/xfractint-20.4.10/common/miscres.c:1539:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((infile=fopen(fullpath, "rb")) != NULL) {
data/xfractint-20.4.10/common/miscres.c:1556:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char msg[200];
data/xfractint-20.4.10/common/miscres.c:1568:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            if((infile=fopen(fullpath, "rb")) != NULL) {
data/xfractint-20.4.10/common/miscres.c:1595:13:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
            strcat(fname, "rc");
data/xfractint-20.4.10/common/miscres.c:1600:13:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
            strcat(fname, "rc");
data/xfractint-20.4.10/common/miscres.c:1604:10:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
         strcat(fname, "num");
data/xfractint-20.4.10/common/miscres.c:1607:10:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
         strcat(fname, "chr");
data/xfractint-20.4.10/common/miscres.c:1610:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((infile=fopen(fullpath, "rb")) != NULL) {
data/xfractint-20.4.10/common/miscres.c:1673:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          fp = fopen("matherr","w");
data/xfractint-20.4.10/common/miscres.c:1686:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[40];
data/xfractint-20.4.10/common/miscres.c:1687:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf,"%e",except->arg1);
data/xfractint-20.4.10/common/miscres.c:1732:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[30];
data/xfractint-20.4.10/common/miscres.c:1733:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(buf,"%-10.7g",*x);
data/xfractint-20.4.10/common/miscres.c:1739:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[30];
data/xfractint-20.4.10/common/miscres.c:1740:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(buf,"%-1.15lg",*x);
data/xfractint-20.4.10/common/parser.c:152:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char token_str[80];
data/xfractint-20.4.10/common/parser.c:175:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char name[34];
data/xfractint-20.4.10/common/parser.c:333:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   return((char far *)ErrStrings[which]);
data/xfractint-20.4.10/common/parser.c:2127:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      out = atoi(s+2);
data/xfractint-20.4.10/common/parser.c:3176:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      debug_token = fopen("frmconst.txt","at");
data/xfractint-20.4.10/common/parser.c:3492:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((debug_token = fopen("frmtokens.txt","at")) != NULL)
data/xfractint-20.4.10/common/parser.c:3575:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char msgbuf[100];
data/xfractint-20.4.10/common/parser.c:3577:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(msgbuf, ":\n   ");
data/xfractint-20.4.10/common/parser.c:3589:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char sym_buf[20];
data/xfractint-20.4.10/common/parser.c:3638:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char par_buf[30];
data/xfractint-20.4.10/common/parser.c:3727:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((debug_fp = fopen("debugfrm.txt","at")) != NULL) {
data/xfractint-20.4.10/common/parser.c:4020:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msgbuf[900];
data/xfractint-20.4.10/common/parser.c:4042:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(&msgbuf[strlen(msgbuf)], "Error(%d) at line %d:  %Fs\n  ", errors[j].error_number, line_number, ParseErrs(errors[j].error_number));
data/xfractint-20.4.10/common/parser.c:4136:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msgbuf[800];
data/xfractint-20.4.10/common/parser.c:4139:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msgbuf, "%f, %f\n", p->complex_const.x, p->complex_const.y);
data/xfractint-20.4.10/common/parser.c:4144:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(msgbuf, "%f, %f\n", p->complex_const.x, p->complex_const.y);
data/xfractint-20.4.10/common/parserfp.c:261:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen("fpdebug.txt","w");
data/xfractint-20.4.10/common/parserfp.c:476:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char cDbgMsg[255];
data/xfractint-20.4.10/common/printer.c:414:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char EndOfLine[3];
data/xfractint-20.4.10/common/printer.c:425:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buff[192];             /* buffer for 192 sets of pixels  */
data/xfractint-20.4.10/common/printer.c:462:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      while ((PRFILE = fopen(PrintName,"r")) != NULL) {
data/xfractint-20.4.10/common/printer.c:468:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if ((PRFILE = fopen(PrintName,"wb")) == NULL) Print_To_File = 0;
data/xfractint-20.4.10/common/printer.c:627:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(triple[1],dacbox,768);
data/xfractint-20.4.10/common/printer.c:637:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(dacbox,triple[1],768);
data/xfractint-20.4.10/common/printer.c:877:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char convert[513];
data/xfractint-20.4.10/common/printer.c:886:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf(&convert[2*i], "%02X",
data/xfractint-20.4.10/common/printer.c:943:27:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                          sprintf(&buff[i], "%02X%02X%02X", dacbox[k][0]<<2,
data/xfractint-20.4.10/common/printer.c:956:29:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                            strcpy(&buff[i],"  ");
data/xfractint-20.4.10/common/printer.c:972:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                strcpy(&buff[i],"  ");
data/xfractint-20.4.10/common/printer.c:1050:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmd[256];
data/xfractint-20.4.10/common/printer.c:1198:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       (char far *)HalfTone[Printer_RStyle],
data/xfractint-20.4.10/common/printer.c:1203:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       (char far *)HalfTone[Printer_GStyle],
data/xfractint-20.4.10/common/printer.c:1208:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       (char far *)HalfTone[Printer_BStyle],
data/xfractint-20.4.10/common/printer.c:1213:41:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                       (char far *)HalfTone[Printer_SStyle],
data/xfractint-20.4.10/common/printer.c:1237:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                     (char far *)HalfTone[Printer_SStyle],
data/xfractint-20.4.10/common/printer.c:1243:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                     (char far *)HalfTone[Printer_SStyle],
data/xfractint-20.4.10/common/printer.c:1308:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buff[80];
data/xfractint-20.4.10/common/printer.c:1367:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char s[500];
data/xfractint-20.4.10/common/printer.c:1381:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fmt1[100];
data/xfractint-20.4.10/common/prompts1.c:66:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char funnyglasses_map_name[MAX_NAME];
data/xfractint-20.4.10/common/prompts1.c:67:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ifsmask[MAX_NAME]     = {"*.ifs"};
data/xfractint-20.4.10/common/prompts1.c:68:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char formmask[MAX_NAME]    = {"*.frm"};
data/xfractint-20.4.10/common/prompts1.c:69:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char lsysmask[MAX_NAME]    = {"*.l"};
data/xfractint-20.4.10/common/prompts1.c:70:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char Glasses1Map[MAX_NAME] = "glasses1.map";
data/xfractint-20.4.10/common/prompts1.c:71:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char MAP_name[FILE_MAX_DIR] = "";
data/xfractint-20.4.10/common/prompts1.c:107:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[81];
data/xfractint-20.4.10/common/prompts1.c:117:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char blanks[78];               /* used to clear text box                */
data/xfractint-20.4.10/common/prompts1.c:275:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         static char *noyes[2] = {s_no,s_yes};
data/xfractint-20.4.10/common/prompts1.c:550:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               values[curchoice].uval.ival = atoi(buf);
data/xfractint-20.4.10/common/prompts1.c:553:46:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
               values[curchoice].uval.Lval = atol(buf);
data/xfractint-20.4.10/common/prompts1.c:672:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(buf,"%.*g",i,val->uval.dval);
data/xfractint-20.4.10/common/prompts1.c:679:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
             sprintf(buf,"%ld",(long)(val->uval.dval-.5));
data/xfractint-20.4.10/common/prompts1.c:682:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
             sprintf(buf,"%ld",(long)(val->uval.dval+.5));
data/xfractint-20.4.10/common/prompts1.c:687:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(buf,"%.7g",val->uval.dval);
data/xfractint-20.4.10/common/prompts1.c:691:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(buf,"%d",val->uval.ival);
data/xfractint-20.4.10/common/prompts1.c:695:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(buf,"%ld",val->uval.Lval);
data/xfractint-20.4.10/common/prompts1.c:783:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[81];
data/xfractint-20.4.10/common/prompts1.c:891:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char name[15];
data/xfractint-20.4.10/common/prompts1.c:902:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char instr[sizeof(o_instr)];
data/xfractint-20.4.10/common/prompts1.c:903:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char head[40];
data/xfractint-20.4.10/common/prompts1.c:908:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tname[40];
data/xfractint-20.4.10/common/prompts1.c:1242:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char far *choices[30];
data/xfractint-20.4.10/common/prompts1.c:1245:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg[120];
data/xfractint-20.4.10/common/prompts1.c:1247:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char bailoutmsg[50];
data/xfractint-20.4.10/common/prompts1.c:1250:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char parmprompt[MAXPARAMS][55];
data/xfractint-20.4.10/common/prompts1.c:1258:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *trignameptr[NUMTRIGFN];
data/xfractint-20.4.10/common/prompts1.c:1393:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tmpbuf[30];
data/xfractint-20.4.10/common/prompts1.c:1411:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(tmpbuf,"%.17g",param[i]);
data/xfractint-20.4.10/common/prompts1.c:1436:31:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      choices[promptnum++] = (char far *)trg[i];
data/xfractint-20.4.10/common/prompts1.c:1734:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *nameptr[MAXFRACTALS];
data/xfractint-20.4.10/common/prompts1.c:1768:37:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      while (newfile || (gfe_file = fopen(filename, "rb")) == NULL) {
data/xfractint-20.4.10/common/prompts1.c:1769:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char buf[60];
data/xfractint-20.4.10/common/prompts1.c:1811:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char name[ITEMNAMELEN+2];
data/xfractint-20.4.10/common/prompts1.c:1853:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[101];
data/xfractint-20.4.10/common/prompts1.c:1959:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                  sprintf(buf, "Too many entries in file, first %ld used", MAXENTRIES);
data/xfractint-20.4.10/common/prompts1.c:1982:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[101];
data/xfractint-20.4.10/common/prompts1.c:2062:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char infhdg[60];
data/xfractint-20.4.10/common/prompts1.c:2070:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char blanks[79];         /* used to clear the entry portion of screen */
data/xfractint-20.4.10/common/prompts1.c:2114:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(infhdg," file entry:\n\n");
data/xfractint-20.4.10/common/prompts1.c:2334:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char line[80];
data/xfractint-20.4.10/common/prompts1.c:2365:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char far *ifs3d_prompts[8];
data/xfractint-20.4.10/common/prompts1.c:2435:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char far *choices[11];
data/xfractint-20.4.10/common/prompts1.c:2445:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char far *prompts3d[21];
data/xfractint-20.4.10/common/prompts1.c:2750:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char far *prompts3d[13];
data/xfractint-20.4.10/common/prompts1.c:2893:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(olddacbox,dacbox,256*3); /* save the DAC */
data/xfractint-20.4.10/common/prompts1.c:2895:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(dacbox,olddacbox,256*3); /* restore the DAC */
data/xfractint-20.4.10/common/prompts1.c:2910:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char far *prompts3d[10];
data/xfractint-20.4.10/common/prompts1.c:2939:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy(funnyglasses_map_name,"grid.map");
data/xfractint-20.4.10/common/prompts2.c:74:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char commandmask[MAX_NAME] = {"*.par"};
data/xfractint-20.4.10/common/prompts2.c:101:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char hdg[sizeof(o_hdg)];
data/xfractint-20.4.10/common/prompts2.c:102:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char far *choices[20];
data/xfractint-20.4.10/common/prompts2.c:105:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char prevsavename[FILE_MAX_DIR+1];
data/xfractint-20.4.10/common/prompts2.c:117:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char *soundmodes[5]={s_off,s_beep,s_x,s_y,s_z};
data/xfractint-20.4.10/common/prompts2.c:255:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(uvalues[k].uval.sval,"%d",fillcolor);
data/xfractint-20.4.10/common/prompts2.c:375:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      fillcolor = atoi(uvalues[k].uval.sval);
data/xfractint-20.4.10/common/prompts2.c:397:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char hdg[sizeof(o_hdg)];
data/xfractint-20.4.10/common/prompts2.c:399:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char far *choices[18];
data/xfractint-20.4.10/common/prompts2.c:451:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(uvalues[k].uval.sval,"auto");
data/xfractint-20.4.10/common/prompts2.c:453:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(uvalues[k].uval.sval,"%-1.15lg",inversion[i]);
data/xfractint-20.4.10/common/prompts2.c:545:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char hdg[sizeof(o_hdg)+sizeof(pressf2)+sizeof(pressf6)];
data/xfractint-20.4.10/common/prompts2.c:547:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char far *choices[20];
data/xfractint-20.4.10/common/prompts2.c:684:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char hdg[sizeof(o_hdg)];
data/xfractint-20.4.10/common/prompts2.c:685:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char far *choices[16];
data/xfractint-20.4.10/common/prompts2.c:803:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char dim[50];
data/xfractint-20.4.10/common/prompts2.c:824:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(dim,"%Fs%4u%Fs%lu",(char far *)xmsg,vesa_yres,(char far *)midxmsg,estm_xmax);
data/xfractint-20.4.10/common/prompts2.c:830:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(dim,"%Fs%4u%Fs%lu",(char far *)ymsg,vesa_xres,(char far *)midymsg,estm_ymax);
data/xfractint-20.4.10/common/prompts2.c:1000:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg[sizeof(o_msg)];
data/xfractint-20.4.10/common/prompts2.c:1003:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char cmdbuf[61];
data/xfractint-20.4.10/common/prompts2.c:1081:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char hdg[sizeof(o_hdg)];
data/xfractint-20.4.10/common/prompts2.c:1082:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char sf1[sizeof(o_sf1)];
data/xfractint-20.4.10/common/prompts2.c:1083:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char sf2[sizeof(o_sf2)];
data/xfractint-20.4.10/common/prompts2.c:1084:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char sf3[sizeof(o_sf3)];
data/xfractint-20.4.10/common/prompts2.c:1088:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char far *starfield_prompts[3];
data/xfractint-20.4.10/common/prompts2.c:1132:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char hdg[sizeof(o_hdg)];
data/xfractint-20.4.10/common/prompts2.c:1133:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char rds0[sizeof(o_rds0)];
data/xfractint-20.4.10/common/prompts2.c:1134:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char rds1[sizeof(o_rds1)];
data/xfractint-20.4.10/common/prompts2.c:1135:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char rds2[sizeof(o_rds2)];
data/xfractint-20.4.10/common/prompts2.c:1136:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char rds3[sizeof(o_rds3)];
data/xfractint-20.4.10/common/prompts2.c:1137:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char rds4[sizeof(o_rds4)];
data/xfractint-20.4.10/common/prompts2.c:1138:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char rds5[sizeof(o_rds5)];
data/xfractint-20.4.10/common/prompts2.c:1139:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char rds6[60];
data/xfractint-20.4.10/common/prompts2.c:1142:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char far *rds_prompts[7];
data/xfractint-20.4.10/common/prompts2.c:1232:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char tmp1[sizeof(tmp)];
data/xfractint-20.4.10/common/prompts2.c:1248:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char hdg[sizeof(o_hdg)];
data/xfractint-20.4.10/common/prompts2.c:1250:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char far *choices[2];
data/xfractint-20.4.10/common/prompts2.c:1299:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     && (parmfile = fopen(CommandFile,"rb")) != NULL) {
data/xfractint-20.4.10/common/prompts2.c:1311:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char goodbyemessage[40];
data/xfractint-20.4.10/common/prompts2.c:1369:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char searchdir[FILE_MAX_DIR];
data/xfractint-20.4.10/common/prompts2.c:1370:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char searchname[FILE_MAX_PATH];
data/xfractint-20.4.10/common/prompts2.c:1371:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char searchext[FILE_MAX_EXT];
data/xfractint-20.4.10/common/prompts2.c:1420:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     char thisname[FILE_MAX_PATH];
data/xfractint-20.4.10/common/prompts2.c:1421:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     char tmpname[FILE_MAX_PATH];
data/xfractint-20.4.10/common/prompts2.c:1422:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     char thisext[FILE_MAX_EXT];
data/xfractint-20.4.10/common/prompts2.c:1511:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char filename[FILE_MAX_PATH]; /* 13 is big enough for Fractint, but not Xfractint */
data/xfractint-20.4.10/common/prompts2.c:1512:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char speedstr[81];
data/xfractint-20.4.10/common/prompts2.c:1513:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmpmask[FILE_MAX_PATH];   /* used to locate next file in list */
data/xfractint-20.4.10/common/prompts2.c:1514:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char old_flname[FILE_MAX_PATH];
data/xfractint-20.4.10/common/prompts2.c:1521:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char name[MAX_NAME];
data/xfractint-20.4.10/common/prompts2.c:1530:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char drive[FILE_MAX_DRIVE];
data/xfractint-20.4.10/common/prompts2.c:1531:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char dir[FILE_MAX_DIR];
data/xfractint-20.4.10/common/prompts2.c:1532:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fname[FILE_MAX_FNAME];
data/xfractint-20.4.10/common/prompts2.c:1533:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ext[FILE_MAX_EXT];
data/xfractint-20.4.10/common/prompts2.c:1591:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(tmpmask,"*.*");
data/xfractint-20.4.10/common/prompts2.c:1677:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   strcat(temp1,"\nTemplate: ");
data/xfractint-20.4.10/common/prompts2.c:1762:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char drive1[FILE_MAX_DRIVE];
data/xfractint-20.4.10/common/prompts2.c:1763:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char dir1[FILE_MAX_DIR];
data/xfractint-20.4.10/common/prompts2.c:1764:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char fname1[FILE_MAX_FNAME];
data/xfractint-20.4.10/common/prompts2.c:1765:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char ext1[FILE_MAX_EXT];
data/xfractint-20.4.10/common/prompts2.c:1781:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char fullpath[FILE_MAX_DIR];
data/xfractint-20.4.10/common/prompts2.c:2034:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[FILE_MAX_PATH];
data/xfractint-20.4.10/common/prompts2.c:2036:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   return(open(tmp,oflag,pmode));
data/xfractint-20.4.10/common/prompts2.c:2042:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[FILE_MAX_PATH];
data/xfractint-20.4.10/common/prompts2.c:2050:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmp[FILE_MAX_PATH];
data/xfractint-20.4.10/common/prompts2.c:2052:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   return(fopen(tmp,mode));
data/xfractint-20.4.10/common/prompts2.c:2063:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[FILE_MAX_DIR+1],curdir[FILE_MAX_DIR+1];
data/xfractint-20.4.10/common/prompts2.c:2118:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[81];
data/xfractint-20.4.10/common/prompts2.c:2141:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char far *prompts[15];
data/xfractint-20.4.10/common/prompts2.c:2145:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char xprompt[sizeof(o_xprompt)];
data/xfractint-20.4.10/common/prompts2.c:2146:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char yprompt[sizeof(o_yprompt)];
data/xfractint-20.4.10/common/prompts2.c:2147:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char zprompt[sizeof(o_zprompt)];
data/xfractint-20.4.10/common/prompts2.c:2337:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char far *prompts[15];
data/xfractint-20.4.10/common/prompts2.c:2341:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char xprompt[sizeof(o_xprompt)];
data/xfractint-20.4.10/common/prompts2.c:2342:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char yprompt[sizeof(o_yprompt)];
data/xfractint-20.4.10/common/prompts2.c:2343:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char zprompt[sizeof(o_zprompt)];
data/xfractint-20.4.10/common/prompts2.c:2552:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char hdg[sizeof(o_hdg)];
data/xfractint-20.4.10/common/prompts2.c:2554:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char far *choices[10];
data/xfractint-20.4.10/common/prompts2.c:2562:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char old_browsemask[MAX_NAME];
data/xfractint-20.4.10/common/prompts2.c:2631:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(browsemask,"*.gif");
data/xfractint-20.4.10/common/prompts2.c:2697:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char drive[FILE_MAX_DRIVE];
data/xfractint-20.4.10/common/prompts2.c:2698:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char dir[FILE_MAX_DIR];
data/xfractint-20.4.10/common/prompts2.c:2699:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fname[FILE_MAX_FNAME];
data/xfractint-20.4.10/common/prompts2.c:2700:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ext[FILE_MAX_EXT];
data/xfractint-20.4.10/common/prompts2.c:2701:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char temp_path[FILE_MAX_PATH];
data/xfractint-20.4.10/common/prompts2.c:2703:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char drive1[FILE_MAX_DRIVE];
data/xfractint-20.4.10/common/prompts2.c:2704:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char dir1[FILE_MAX_DIR];
data/xfractint-20.4.10/common/prompts2.c:2705:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fname1[FILE_MAX_FNAME];
data/xfractint-20.4.10/common/prompts2.c:2706:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ext1[FILE_MAX_EXT];
data/xfractint-20.4.10/common/prompts2.c:2811:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fname[FILE_MAX_FNAME];
data/xfractint-20.4.10/common/prompts2.c:2812:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ext[FILE_MAX_EXT];
data/xfractint-20.4.10/common/prompts2.c:2821:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char fname[FILE_MAX_FNAME];
data/xfractint-20.4.10/common/prompts2.c:2822:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ext[FILE_MAX_EXT];
data/xfractint-20.4.10/common/realdos.c:181:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg[41];
data/xfractint-20.4.10/common/realdos.c:299:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[81];
data/xfractint-20.4.10/common/realdos.c:312:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg[MSGLEN],buf[MSGLEN];
data/xfractint-20.4.10/common/realdos.c:319:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(buf,"FRACTINT Version %d.%01d",release/100,(release%100)/10);
data/xfractint-20.4.10/common/realdos.c:322:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf,"%01d",release%10);
data/xfractint-20.4.10/common/realdos.c:326:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf,".%d",patchlevel);
data/xfractint-20.4.10/common/realdos.c:368:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[81];
data/xfractint-20.4.10/common/realdos.c:505:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[81];
data/xfractint-20.4.10/common/realdos.c:621:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[81];
data/xfractint-20.4.10/common/realdos.c:622:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char curitem[81];
data/xfractint-20.4.10/common/realdos.c:1113:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char far *choices[44]; /* 2 columns * 22 rows */
data/xfractint-20.4.10/common/realdos.c:1409:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char savefld[81];
data/xfractint-20.4.10/common/realdos.c:1410:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[81];
data/xfractint-20.4.10/common/realdos.c:1516:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               char tmpfld[30];
data/xfractint-20.4.10/common/realdos.c:1529:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                  sprintf(tmpfld,"%.15g",tmpd);
data/xfractint-20.4.10/common/realdos.c:1556:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[81];
data/xfractint-20.4.10/common/realdos.c:1622:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[81];
data/xfractint-20.4.10/common/realdos.c:1634:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(buf,"  ");
data/xfractint-20.4.10/common/realdos.c:1636:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(buf,"    ");
data/xfractint-20.4.10/common/realdos.c:1788:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tempstring[150];
data/xfractint-20.4.10/common/realdos.c:1803:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     || (cfgfile = fopen(tempstring,"r")) == NULL)   /* can't open it */
data/xfractint-20.4.10/common/realdos.c:1835:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      dotmode     = atoi(&tempstring[commas[5]]);
data/xfractint-20.4.10/common/realdos.c:1836:21:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      xdots       = atol(&tempstring[commas[6]]);
data/xfractint-20.4.10/common/realdos.c:1837:21:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      ydots       = atol(&tempstring[commas[7]]);
data/xfractint-20.4.10/common/realdos.c:1838:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      colors      = atoi(&tempstring[commas[8]]);
data/xfractint-20.4.10/common/realdos.c:2020:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf,"F%d",k);
data/xfractint-20.4.10/common/rotate.c:29:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char mapmask[MAX_NAME] = {"*.map"};
data/xfractint-20.4.10/common/rotate.c:295:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(dacbox,olddacbox,256*3);
data/xfractint-20.4.10/common/rotate.c:361:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char msg[sizeof(o_msg)];
data/xfractint-20.4.10/common/rotate.c:431:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char palname[FILE_MAX_PATH];
data/xfractint-20.4.10/common/rotate.c:433:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg[sizeof(o_msg)];
data/xfractint-20.4.10/common/rotate.c:446:10:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
         strcat(temp1,".map");
data/xfractint-20.4.10/common/rotate.c:448:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      dacfile = fopen(palname,"w");
data/xfractint-20.4.10/common/rotate.c:454:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char tmpfilename[FILE_MAX_PATH];
data/xfractint-20.4.10/common/rotate.c:472:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(olddacbox,dacbox,256*3);
data/xfractint-20.4.10/common/rotate.c:485:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char filename[FILE_MAX_PATH];
data/xfractint-20.4.10/common/rotate.c:495:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(olddacbox,dacbox,256*3);
data/xfractint-20.4.10/common/slideshw.c:84:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      if(far_strcmp((char far *)mn,scancodes[i].mnemonic)==0)
data/xfractint-20.4.10/common/slideshw.c:143:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char nearbuf[41];
data/xfractint-20.4.10/common/slideshw.c:161:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buffer[81];
data/xfractint-20.4.10/common/slideshw.c:238:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
         out=atoi(buffer);
data/xfractint-20.4.10/common/slideshw.c:251:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[41];
data/xfractint-20.4.10/common/slideshw.c:271:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buffer1[80];
data/xfractint-20.4.10/common/slideshw.c:315:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char msg[MSGLEN];
data/xfractint-20.4.10/common/slideshw.c:326:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if((fpss=fopen(autoname,"r"))==NULL)
data/xfractint-20.4.10/common/slideshw.c:345:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char mn[MAX_MNEMONIC];
data/xfractint-20.4.10/common/slideshw.c:350:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if((fpss=fopen(autoname,"w"))==NULL)
data/xfractint-20.4.10/common/slideshw.c:384:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[10];
data/xfractint-20.4.10/common/slideshw.c:404:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msgbuf[300];
data/xfractint-20.4.10/common/stereo.c:28:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char stereomapname[FILE_MAX_DIR+1] = {""};
data/xfractint-20.4.10/common/stereo.c:246:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(savedacbox, dacbox, 256 * 3);  /* save colors */
data/xfractint-20.4.10/common/stereo.c:367:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(dacbox, savedacbox, 256 * 3);
data/xfractint-20.4.10/common/targa.c:649:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
              i = atoi(envptr+1);
data/xfractint-20.4.10/dos_help/hc.c:198:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char      is_label[MAX_CONTENT_TOPIC];
data/xfractint-20.4.10/dos_help/hc.c:199:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     *topic_name[MAX_CONTENT_TOPIC];
data/xfractint-20.4.10/dos_help/hc.c:244:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     src_fname[81]    = "";   /* command-line .SRC filename */
data/xfractint-20.4.10/dos_help/hc.c:245:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     hdr_fname[81]    = "";   /* .H filename */
data/xfractint-20.4.10/dos_help/hc.c:246:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     hlp_fname[81]    = "";   /* .HLP filename */
data/xfractint-20.4.10/dos_help/hc.c:256:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char     cmd[128];                /* holds the current command */
data/xfractint-20.4.10/dos_help/hc.c:521:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(ptr, s, len);
data/xfractint-20.4.10/dos_help/hc.c:766:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char buff[4];
data/xfractint-20.4.10/dos_help/hc.c:780:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
         ch = atoi(buff);
data/xfractint-20.4.10/dos_help/hc.c:926:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char buff[16];
data/xfractint-20.4.10/dos_help/hc.c:929:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buff, "\'%c\'", ch);
data/xfractint-20.4.10/dos_help/hc.c:931:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buff, "\'\\x%02X\'", ch&0xFF);
data/xfractint-20.4.10/dos_help/hc.c:1028:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
         indent = atoi(cmd);
data/xfractint-20.4.10/dos_help/hc.c:1159:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
         l.topic_num = atoi(cmd+1);
data/xfractint-20.4.10/dos_help/hc.c:1200:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(curr, ptr, len);
data/xfractint-20.4.10/dos_help/hc.c:1227:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char  *title[MAX_TABLE_SIZE];
data/xfractint-20.4.10/dos_help/hc.c:1351:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(curr, title[lnum], len);
data/xfractint-20.4.10/dos_help/hc.c:1421:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ( (handle=open(cmd+7, O_RDONLY|O_BINARY)) == -1 )
data/xfractint-20.4.10/dos_help/hc.c:1550:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ( (srcfile = fopen(fname, "rt")) == NULL )
data/xfractint-20.4.10/dos_help/hc.c:1803:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                     lformat_exclude = atoi(cmd+14);
data/xfractint-20.4.10/dos_help/hc.c:1835:35:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                  if ( (srcfile = fopen(cmd+8, "rt")) == NULL )
data/xfractint-20.4.10/dos_help/hc.c:1873:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                  version = atoi(cmd+8);
data/xfractint-20.4.10/dos_help/hc.c:2898:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     buf[4];
data/xfractint-20.4.10/dos_help/hc.c:2910:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf, "%d", c->doc_page);
data/xfractint-20.4.10/dos_help/hc.c:2913:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(base+c->page_num_pos+(3-len), buf, len);
data/xfractint-20.4.10/dos_help/hc.c:3087:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char nfile[MAXFILE],
data/xfractint-20.4.10/dos_help/hc.c:3121:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   hdr = fopen(fname, "rt");
data/xfractint-20.4.10/dos_help/hc.c:3125:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      hdr = fopen(fname, "wt");
data/xfractint-20.4.10/dos_help/hc.c:3137:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   temp = fopen(TEMP_FNAME, "wt");
data/xfractint-20.4.10/dos_help/hc.c:3145:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   temp = fopen(TEMP_FNAME, "rt");
data/xfractint-20.4.10/dos_help/hc.c:3346:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   hlp = fopen(fname, "wb");
data/xfractint-20.4.10/dos_help/hc.c:3438:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         char buff[20];
data/xfractint-20.4.10/dos_help/hc.c:3442:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         sprintf(buff, "%d\n\n", pd->pnum);
data/xfractint-20.4.10/dos_help/hc.c:3499:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ( (info.file = fopen(fname, "wt")) == NULL )
data/xfractint-20.4.10/dos_help/hc.c:3628:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ( (exe=open(exe_fname, O_RDWR|O_BINARY)) == -1 )
data/xfractint-20.4.10/dos_help/hc.c:3631:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ( (hlp=open(hlp_fname, O_RDONLY|O_BINARY)) == -1 )
data/xfractint-20.4.10/dos_help/hc.c:3686:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if ( (exe=open(exe_fname, O_RDWR|O_BINARY)) == -1 )
data/xfractint-20.4.10/dos_help/hc.c:3732:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char   fname1[81],
data/xfractint-20.4.10/dos_help/hc.c:3734:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char   swappath[81];
data/xfractint-20.4.10/dos_help/hc.c:3861:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
         if ( (swapfile=fopen(swappath, "w+b")) == NULL )
data/xfractint-20.4.10/dos_help/hc.c:3905:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
         if ( (swapfile=fopen(swappath, "w+b")) == NULL )
data/xfractint-20.4.10/extra/tru.c:28:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf1[12];
data/xfractint-20.4.10/extra/tru.c:29:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf2[2];
data/xfractint-20.4.10/extra/tru.c:31:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if((fpin = fopen("iterates.tga","rb"))==NULL)
data/xfractint-20.4.10/extra/tru.c:36:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if((fpout = fopen("new.tga","wb"))==NULL)
data/xfractint-20.4.10/headers/externs.h:54:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char                  browsemask[MAX_NAME];
data/xfractint-20.4.10/headers/externs.h:81:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char                  CommandComment[4][MAXCMT];
data/xfractint-20.4.10/headers/externs.h:82:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char                  CommandFile[FILE_MAX_PATH];
data/xfractint-20.4.10/headers/externs.h:83:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char                  CommandName[ITEMNAMELEN + 1];
data/xfractint-20.4.10/headers/externs.h:164:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char                  file_name_stack[16][MAX_NAME];
data/xfractint-20.4.10/headers/fractint.h:63:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char    name[26];       /* Adapter name (IBM EGA, etc)          */
data/xfractint-20.4.10/headers/fractint.h:64:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char    comment[26];    /* Comments (UNTESTED, etc)             */
data/xfractint-20.4.10/headers/fractint.h:115:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  info_id[8];       /* Unique identifier for info block */
data/xfractint-20.4.10/headers/fractint.h:321:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[FILE_MAX_PATH];
data/xfractint-20.4.10/headers/fractint.h:322:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char itemname[ITEMNAMELEN+1];
data/xfractint-20.4.10/headers/fractint.h:323:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char dac[256][3];
data/xfractint-20.4.10/headers/fractint.h:350:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  form_name[40];
data/xfractint-20.4.10/headers/fractint.h:472:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char     far *param[MAXPARAMS-4];    /* name of the parameters */
data/xfractint-20.4.10/headers/fractint.h:482:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char  far *param[4];                 /* name of the parameters */
data/xfractint-20.4.10/headers/fractint.h:938:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char   sval[16];  /* when type is 's'      */
data/xfractint-20.4.10/headers/fractint.h:990:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char form_name[40];
data/xfractint-20.4.10/headers/fractint.h:1050:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char par[FILE_MAX_PATH];
data/xfractint-20.4.10/headers/fractint.h:1051:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char frm[FILE_MAX_PATH];
data/xfractint-20.4.10/headers/fractint.h:1052:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ifs[FILE_MAX_PATH];
data/xfractint-20.4.10/headers/fractint.h:1053:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char lsys[FILE_MAX_PATH];
data/xfractint-20.4.10/headers/fractint.h:1074:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char name[16]; /* name of variable (for menu ) */
data/xfractint-20.4.10/headers/helpcom.h:188:5:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    bcopy(ptr,&s,sizeof(int));
data/xfractint-20.4.10/headers/helpcom.h:197:5:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    bcopy(&n,ptr,sizeof(int));
data/xfractint-20.4.10/headers/helpcom.h:437:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char      page_text[10];
data/xfractint-20.4.10/headers/helpcom.h:646:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                           sprintf(page_text, "(p. %d)", pd.i);
data/xfractint-20.4.10/headers/helpcom.h:762:22:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                     sprintf(page_text, " (p. %d)", pd.i);
data/xfractint-20.4.10/headers/port.h:79:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define _fmemcpy  memcpy
data/xfractint-20.4.10/headers/port.h:296:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     char path[21];             /* DOS path and filespec */
data/xfractint-20.4.10/headers/port.h:301:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     char filename[MAX_NAME+1];         /* Filename and extension */
data/xfractint-20.4.10/headers/unix.h:73:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
# ifdef memcpy   
data/xfractint-20.4.10/headers/unix.h:74:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#  undef memcpy   
data/xfractint-20.4.10/headers/unix.h:80:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
# define memcpy(dst,src,n) bcopy(src,dst,n)
data/xfractint-20.4.10/headers/unix.h:80:28:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
# define memcpy(dst,src,n) bcopy(src,dst,n)
data/xfractint-20.4.10/headers/unix.h:81:29:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
# define memmove(dst,src,n) bcopy(src,dst,n)
data/xfractint-20.4.10/headers/unix.h:83:10:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
# define bcopy(src,dst,n) memcpy(dst,src,n)
data/xfractint-20.4.10/headers/unix.h:83:27:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
# define bcopy(src,dst,n) memcpy(dst,src,n)
data/xfractint-20.4.10/headers/unix.h:97:47:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define movedata(s_seg,s_off,d_seg,d_off,len) bcopy(s_off,d_off,len)
data/xfractint-20.4.10/unix/diskvidu.c:90:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[20];
data/xfractint-20.4.10/unix/diskvidu.c:97:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf,"%d x %d",sxdots,sydots);
data/xfractint-20.4.10/unix/diskvidu.c:103:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	 sprintf(buf,"%d",colors);
data/xfractint-20.4.10/unix/diskvidu.c:140:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[41];
data/xfractint-20.4.10/unix/diskvidu.c:143:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	 sprintf(buf," reading line %4d",
data/xfractint-20.4.10/unix/diskvidu.c:172:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[41];
data/xfractint-20.4.10/unix/diskvidu.c:175:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	 sprintf(buf," writing line %4d",
data/xfractint-20.4.10/unix/diskvidu.c:203:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buf[41];
data/xfractint-20.4.10/unix/diskvidu.c:206:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(buf,msg,strlen(msg));
data/xfractint-20.4.10/unix/general.c:27:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char tstack[4096];
data/xfractint-20.4.10/unix/general.c:54:5:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    bcopy(fromaddr,(char *)(extraseg+tooffset),fromcount);
data/xfractint-20.4.10/unix/general.c:63:5:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    bcopy((char *)(extraseg+fromoffset),toaddr,tocount);
data/xfractint-20.4.10/unix/general.c:482:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(a,b,len);
data/xfractint-20.4.10/unix/general.c:523:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy((char *)info,(char *)buf,FRACTAL_INFO_SIZE);
data/xfractint-20.4.10/unix/general.c:527:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy((char *)info,(char *)buf,sizeof(struct fractal_info));
data/xfractint-20.4.10/unix/general.c:670:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy((char *)buf,(char *)info,FRACTAL_INFO_SIZE);
data/xfractint-20.4.10/unix/general.c:703:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	*dst = (*src)[0] + ((((char *)(*src))[1])<<8);
data/xfractint-20.4.10/unix/general.c:724:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    (((long)(((char *)(*src))[3]))<<24);
data/xfractint-20.4.10/unix/general.c:906:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy((char *)ranges, (char *)buf, num*2);
data/xfractint-20.4.10/unix/general.c:910:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy((char *)ranges, (char *)buf, num*sizeof(int));
data/xfractint-20.4.10/unix/general.c:930:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy((char *)info,(char *)buf,EVOLVER_INFO_SIZE);
data/xfractint-20.4.10/unix/general.c:934:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy((char *)info,(char *)buf,sizeof(struct evolution_info));
data/xfractint-20.4.10/unix/general.c:967:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy((char *)buf,(char *)info,EVOLVER_INFO_SIZE);
data/xfractint-20.4.10/unix/general.c:985:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy((char *)info,(char *)buf,ORBITS_INFO_SIZE);
data/xfractint-20.4.10/unix/general.c:989:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy((char *)info,(char *)buf,sizeof(struct orbits_info));
data/xfractint-20.4.10/unix/general.c:1011:2:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	bcopy((char *)buf,(char *)info,ORBITS_INFO_SIZE);
data/xfractint-20.4.10/unix/unix.c:277:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(fullpathname,O_RDONLY);
data/xfractint-20.4.10/unix/unix.c:288:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open(fullpathname,O_RDONLY);
data/xfractint-20.4.10/unix/unix.c:297:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(fullpathname,O_RDONLY);
data/xfractint-20.4.10/unix/unix.c:302:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(fullpathname,"./");
data/xfractint-20.4.10/unix/unix.c:304:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(fullpathname,O_RDONLY);
data/xfractint-20.4.10/unix/unix.c:332:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(str,"%10d",(int)num);
data/xfractint-20.4.10/unix/unixscr.c:92:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern unsigned char dacbox[256][3];
data/xfractint-20.4.10/unix/unixscr.c:263:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	fixcolors = atoi(argv[(*i)+1]);
data/xfractint-20.4.10/unix/unixscr.c:279:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        textmargin = atoi(argv[(*i)+1]);
data/xfractint-20.4.10/unix/unixscr.c:413:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[200];
data/xfractint-20.4.10/unix/unixscr.c:473:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char out[20];
data/xfractint-20.4.10/unix/unixscr.c:798:7:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      bcopy(Ximage->data, Ximage->data+i*Ximage->bytes_per_line, 
data/xfractint-20.4.10/unix/unixscr.c:1292:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      static unsigned char last_dac[256][3];
data/xfractint-20.4.10/unix/unixscr.c:1914:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buffer[1];
data/xfractint-20.4.10/unix/unixscr.c:1932:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buffer[1];
data/xfractint-20.4.10/unix/unixscr.c:2423:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str[8];
data/xfractint-20.4.10/unix/unixscr.c:2512:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cmd[256];
data/xfractint-20.4.10/unix/unixscr.c:2518:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *argv[2];
data/xfractint-20.4.10/unix/video.c:488:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char tmp[3];
data/xfractint-20.4.10/unix/video.c:506:8:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      bcopy (dacbot, tmp, 3 * sizeof (unsigned char));
data/xfractint-20.4.10/unix/video.c:507:8:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      bcopy (dacbot + 3 * sizeof (unsigned char), dacbot, len);
data/xfractint-20.4.10/unix/video.c:508:8:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      bcopy (tmp, dacbot + len, 3 * sizeof (unsigned char));
data/xfractint-20.4.10/unix/video.c:515:8:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      bcopy (dacbot + len, tmp, 3 * sizeof (unsigned char));
data/xfractint-20.4.10/unix/video.c:516:8:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      bcopy (dacbot, dacbot + 3 * sizeof (unsigned char), len);
data/xfractint-20.4.10/unix/video.c:517:8:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      bcopy (tmp, dacbot, 3 * sizeof (unsigned char));
data/xfractint-20.4.10/unix/video.c:838:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  bcopy (fromptr, toptr, len);
data/xfractint-20.4.10/unix/xfcurses.c:51:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char * xc[16] = {
data/xfractint-20.4.10/unix/xfcurses.c:175:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str[4];
data/xfractint-20.4.10/unix/xfcurses.c:247:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str[4];
data/xfractint-20.4.10/unix/xfcurses.c:313:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(&win->_text[k], &win->_text[k+win->_num_x], win->_num_x);
data/xfractint-20.4.10/unix/xfcurses.c:314:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(&win->_attr[k], &win->_attr[k+win->_num_x], win->_num_x*ATTRSIZE);
data/xfractint-20.4.10/unix/xfcurses.c:327:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(&win->_text[k], &win->_text[k-win->_num_x], win->_num_x);
data/xfractint-20.4.10/unix/xfcurses.c:328:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
     memcpy(&win->_attr[k], &win->_attr[k-win->_num_x], win->_num_x*ATTRSIZE);
data/xfractint-20.4.10/unix/xfcurses.c:355:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str[4];
data/xfractint-20.4.10/common/ant.c:49:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      while ((int)strlen(msg) < 15)
data/xfractint-20.4.10/common/ant.c:50:10:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
         strcat(msg, " ");
data/xfractint-20.4.10/common/ant.c:413:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   rule_len = strlen(rule);
data/xfractint-20.4.10/common/bigflt.c:73:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = s + strlen(s) - 1;  /* last digit */
data/xfractint-20.4.10/common/bignum.c:271:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        l = strlen(s) - 1;      /* start with the last digit */
data/xfractint-20.4.10/common/bignum.c:381:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l = strlen(s);
data/xfractint-20.4.10/common/cmdfiles.c:877:19:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while ((i = getc(handle)) != '{' && i != EOF) { }
data/xfractint-20.4.10/common/cmdfiles.c:926:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  if ((int)strlen(lineptr) >= MAXCMT)
data/xfractint-20.4.10/common/cmdfiles.c:968:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
         strncpy(tmpbuf,&linebuf[1],9);
data/xfractint-20.4.10/common/cmdfiles.c:973:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
         strncpy(tmpbuf,&linebuf[1],10);
data/xfractint-20.4.10/common/cmdfiles.c:1046:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      value = curarg + (j = strlen(curarg));
data/xfractint-20.4.10/common/cmdfiles.c:1048:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(variable,curarg,j);          /* get the variable name  */
data/xfractint-20.4.10/common/cmdfiles.c:1050:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   valuelen = strlen(value);            /* note value's length    */
data/xfractint-20.4.10/common/cmdfiles.c:1063:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         argptr2 = argptr + strlen(argptr);
data/xfractint-20.4.10/common/cmdfiles.c:1108:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      else if (((int)strlen(argptr) > 513)  /* very long command */
data/xfractint-20.4.10/common/cmdfiles.c:1158:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             if (far_strncmp(value,adapter_name,strlen(adapter_name)) == 0) {
data/xfractint-20.4.10/common/cmdfiles.c:1274:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(CommandName,next,ITEMNAMELEN);
data/xfractint-20.4.10/common/cmdfiles.c:2295:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      for (k=0; k < (int)strlen(value); k++) {
data/xfractint-20.4.10/common/cmdfiles.c:2943:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(temp_name,&value[1],MAX_NAME);
data/xfractint-20.4.10/common/cmdfiles.c:2947:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if ((int)strlen(value) > FILE_MAX_PATH || ValidateLuts(MAP_name) != 0)
data/xfractint-20.4.10/common/cmdfiles.c:3072:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if ((int)strlen(badarg) > 70) badarg[70] = 0;
data/xfractint-20.4.10/common/cmdfiles.c:3152:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(curarg);
data/xfractint-20.4.10/common/cmdfiles.c:3192:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(cmd,cmdstr,30);
data/xfractint-20.4.10/common/cmdfiles.c:3196:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(cmd,"=");
data/xfractint-20.4.10/common/diskvid.c:236:28:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         *tmpptr++ = (BYTE)fgetc(fp);
data/xfractint-20.4.10/common/editpal.c:1961:14:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   int cmd = getc(this->undo_file);
data/xfractint-20.4.10/common/editpal.c:1974:36:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            first = (unsigned char)getc(this->undo_file);
data/xfractint-20.4.10/common/editpal.c:1975:36:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            last  = (unsigned char)getc(this->undo_file);
data/xfractint-20.4.10/common/editpal.c:1978:43:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            first = last = (unsigned char)getc(this->undo_file);
data/xfractint-20.4.10/common/editpal.c:2004:37:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         int first = (unsigned char)getc(this->undo_file);
data/xfractint-20.4.10/common/editpal.c:2005:37:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         int last  = (unsigned char)getc(this->undo_file);
data/xfractint-20.4.10/common/encoder.c:125:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      i = strlen(tmpfile);
data/xfractint-20.4.10/common/encoder.c:163:7:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
      usleep(300000);
data/xfractint-20.4.10/common/f16.c:77:26:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if ((count = getc(fp)) > 127) {
data/xfractint-20.4.10/common/fractalb.c:37:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(msg," ");
data/xfractint-20.4.10/common/fractalb.c:38:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        bntostr(msg+strlen(s),40,n);
data/xfractint-20.4.10/common/fractalb.c:65:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
   strcat(msg3,"\n");
data/xfractint-20.4.10/common/fractalb.c:110:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
   strcat(msg3,"\n");
data/xfractint-20.4.10/common/fractalb.c:138:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
   strcat(msg3,"\n");
data/xfractint-20.4.10/common/fractalb.c:228:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(msg," ");
data/xfractint-20.4.10/common/fractalb.c:229:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        bftostr_e(msg+strlen(s),40,n);
data/xfractint-20.4.10/common/gifview.c:39:12:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   return (getc(fpin)); /* EOF is -1, as desired */
data/xfractint-20.4.10/common/help.c:615:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   dummy = read(help_file, (char *)&num_pages, sizeof(int));
data/xfractint-20.4.10/common/help.c:620:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   dummy = read(help_file, &ch, 1);
data/xfractint-20.4.10/common/help.c:623:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   dummy = read(help_file, (char *)title, len);
data/xfractint-20.4.10/common/help.c:986:4:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
   strcat(path,"/");
data/xfractint-20.4.10/common/help.c:1021:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      dummy = read(help_file, (char *)&t, sizeof(int)); /* read num_pages */
data/xfractint-20.4.10/common/help.c:1026:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      dummy = read(help_file, &ch, 1);                  /* read title_len */
data/xfractint-20.4.10/common/help.c:1032:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      dummy = read(help_file, (char *)&curr_len, sizeof(int)); /* read topic len */
data/xfractint-20.4.10/common/help.c:1160:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         dummy = read(help_file, (char *)&t, sizeof(int));      /* read flags */
data/xfractint-20.4.10/common/help.c:1164:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         dummy = read(help_file, &ch, 1);       /* read id len */
data/xfractint-20.4.10/common/help.c:1167:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         dummy = read(help_file, (char *)info->id, t);  /* read the id */
data/xfractint-20.4.10/common/help.c:1171:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         dummy = read(help_file, (char *)&ch, 1);       /* read title len */
data/xfractint-20.4.10/common/help.c:1174:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         dummy = read(help_file, (char *)info->title, t); /* read the title */
data/xfractint-20.4.10/common/help.c:1178:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         dummy = read(help_file, (char *)&ch, 1);       /* read num_topic */
data/xfractint-20.4.10/common/help.c:1181:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         dummy = read(help_file, (char *)info->topic_num, t*sizeof(int));  /* read topic_num[] */
data/xfractint-20.4.10/common/help.c:1236:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         memmove(line + ((width-(int)(strlen(buff))) / 2)-4, buff, strlen(buff));
data/xfractint-20.4.10/common/help.c:1236:68:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         memmove(line + ((width-(int)(strlen(buff))) / 2)-4, buff, strlen(buff));
data/xfractint-20.4.10/common/help.c:1239:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         memmove(line + (width - (int)strlen(buff)), buff, strlen(buff));
data/xfractint-20.4.10/common/help.c:1239:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         memmove(line + (width - (int)strlen(buff)), buff, strlen(buff));
data/xfractint-20.4.10/common/help.c:1367:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   dummy = read(help_file, (char *)&info.num_contents, sizeof(int));
data/xfractint-20.4.10/common/help.c:1368:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   dummy = read(help_file, (char *)&info.num_page, sizeof(int));
data/xfractint-20.4.10/common/help.c:1471:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
               dummy = read(help_file, (char *)&hs, sizeof(hs));
data/xfractint-20.4.10/common/help.c:1517:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         dummy = read(help_file, (char *)&hs, sizeof(long)+sizeof(int));
data/xfractint-20.4.10/common/help.c:1552:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   dummy = read(help_file, (char *)&max_pages, sizeof(int));
data/xfractint-20.4.10/common/help.c:1553:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   dummy = read(help_file, (char *)&max_links, sizeof(int));
data/xfractint-20.4.10/common/help.c:1554:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   dummy = read(help_file, (char *)&num_topic, sizeof(int));
data/xfractint-20.4.10/common/help.c:1555:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   dummy = read(help_file, (char *)&num_label, sizeof(int));
data/xfractint-20.4.10/common/jiim.c:890:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               while((int)strlen(str) < 40)
data/xfractint-20.4.10/common/jiim.c:891:19:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                  strcat(str," ");
data/xfractint-20.4.10/common/jiim.c:899:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               displays(5, vesa_yres-show_numbers, WHITE, BLACK, str,strlen(str));
data/xfractint-20.4.10/common/line3d.c:1433:16:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         fputc(fgetc(Source), fps);
data/xfractint-20.4.10/common/line3d.c:1472:19:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            fputc(fgetc(Source), fps);
data/xfractint-20.4.10/common/line3d.c:1515:19:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   T_header_24 += fgetc(fp);    /* Check ID field and adjust header size */
data/xfractint-20.4.10/common/line3d.c:1517:8:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if (fgetc(fp))               /* Make sure this is an unmapped file */
data/xfractint-20.4.10/common/line3d.c:1523:8:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if (fgetc(fp) != 2)          /* Make sure it is a type 2 file */
data/xfractint-20.4.10/common/line3d.c:1531:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      fgetc(fp);
data/xfractint-20.4.10/common/line3d.c:1536:7:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      fgetc(fp);
data/xfractint-20.4.10/common/line3d.c:1547:11:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (fgetc(fp) != (int) upr_lwr[i])
data/xfractint-20.4.10/common/line3d.c:1553:8:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if (fgetc(fp) != (int) T24)
data/xfractint-20.4.10/common/line3d.c:1555:8:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if (fgetc(fp) != (int) T32)
data/xfractint-20.4.10/common/loadfdos.c:274:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            i = strlen(temp1);
data/xfractint-20.4.10/common/loadfdos.c:282:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat((char *)dstack,"\n");
data/xfractint-20.4.10/common/loadfdos.c:292:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat((char *)dstack,"\n");
data/xfractint-20.4.10/common/loadfdos.c:442:52:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
   if (tmpflags & (VI_VSMALL+VI_CSMALL+VI_ASPECT)) strcat(errbuf,"*");
data/xfractint-20.4.10/common/loadfdos.c:443:30:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
   if (tmpflags & VI_VSMALL) strcat(errbuf,"R");
data/xfractint-20.4.10/common/loadfdos.c:444:30:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
   if (tmpflags & VI_CSMALL) strcat(errbuf,"C");
data/xfractint-20.4.10/common/loadfdos.c:445:30:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
   if (tmpflags & VI_ASPECT) strcat(errbuf,"A");
data/xfractint-20.4.10/common/loadfdos.c:446:30:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
   if (tmpflags & VI_VBIG)   strcat(errbuf,"v");
data/xfractint-20.4.10/common/loadfdos.c:447:30:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
   if (tmpflags & VI_CBIG)   strcat(errbuf,"c");
data/xfractint-20.4.10/common/loadfile.c:590:22:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if ((k = getc(fp)) < 0)
data/xfractint-20.4.10/common/loadfile.c:668:17:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if (fgetc(fp) != '!' /* if not what we expect just give up */
data/xfractint-20.4.10/common/loadfile.c:836:18:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   while ((len = fgetc(fp)) > 0) {
data/xfractint-20.4.10/common/loadfile.c:839:34:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            *(loadptr++) = (char)fgetc(fp);
data/xfractint-20.4.10/common/loadfile.c:841:13:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            fgetc(fp); /* discard excess characters */
data/xfractint-20.4.10/common/loadfile.c:851:18:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   while ((len = fgetc(fp)) > 0) {
data/xfractint-20.4.10/common/loadfile.c:1397:11:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
          strcpy(mesg,"");
data/xfractint-20.4.10/common/loadfile.c:1440:10:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
         strcpy(mesg,"");
data/xfractint-20.4.10/common/lsys.c:80:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
   strcpy(numstr,"");
data/xfractint-20.4.10/common/lsys.c:134:16:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   while ((c = fgetc(infile)) != '{')
data/xfractint-20.4.10/common/lsys.c:149:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if ((int)strspn(inline1," \t\n") < (int)strlen(inline1)) /* not a blank line */
data/xfractint-20.4.10/common/lsys.c:175:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               sprintf(&msgbuf[strlen(msgbuf)],
data/xfractint-20.4.10/common/lsys.c:205:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               sprintf(&msgbuf[strlen(msgbuf)],
data/xfractint-20.4.10/common/lsys.c:215:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  sprintf(&msgbuf[strlen(msgbuf)],
data/xfractint-20.4.10/common/lsys.c:237:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      msgbuf[strlen(msgbuf)-1]=0; /* strip trailing \n */
data/xfractint-20.4.10/common/lsys.c:366:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   i=strlen(rule)+1;
data/xfractint-20.4.10/common/lsys.c:383:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   j = strlen(rule) + 1;
data/xfractint-20.4.10/common/miscfrac.c:1530:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      t = (S16)strlen(buf);
data/xfractint-20.4.10/common/miscfrac.c:1571:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   t = (S16)strlen(buf);
data/xfractint-20.4.10/common/miscovl.c:140:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
   strcpy(colorspec,"y");
data/xfractint-20.4.10/common/miscovl.c:176:10:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
         strcpy (colorspec,"y");
data/xfractint-20.4.10/common/miscovl.c:184:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
         strncpy(&colorspec[1], sptr, MAX_NAME-1);
data/xfractint-20.4.10/common/miscovl.c:271:10:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
         strcpy(colorspec,"y");
data/xfractint-20.4.10/common/miscovl.c:344:13:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
            strcpy(colorspec, "y");
data/xfractint-20.4.10/common/miscovl.c:346:13:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
            strcpy(colorspec, "n");
data/xfractint-20.4.10/common/miscovl.c:363:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         i = strlen(outname);
data/xfractint-20.4.10/common/miscovl.c:442:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            while(w < (int)strlen(CommandName))
data/xfractint-20.4.10/common/miscovl.c:1479:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         bptr = buf + strlen(buf);
data/xfractint-20.4.10/common/miscovl.c:1910:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   i = strlen(outname);
data/xfractint-20.4.10/common/miscovl.c:1933:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         i = strlen(buf);
data/xfractint-20.4.10/common/miscovl.c:2478:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         j += strlen(varstr);
data/xfractint-20.4.10/common/miscres.c:529:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   hold = fname + strlen(fname) - 1; /* start at the end */
data/xfractint-20.4.10/common/miscres.c:561:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   for (i = 0; i < (int)strlen(openfile); i++)
data/xfractint-20.4.10/common/miscres.c:644:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(trigname,name,6);
data/xfractint-20.4.10/common/miscres.c:940:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         i = strlen(FormName)+1;
data/xfractint-20.4.10/common/miscres.c:942:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if((int)strlen(FormFileName) >= 29)
data/xfractint-20.4.10/common/miscres.c:953:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if((int)strlen(LFileName) >= 28)
data/xfractint-20.4.10/common/miscres.c:962:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if((int)strlen(IFSFileName) >= 28)
data/xfractint-20.4.10/common/miscres.c:1644:16:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if ((c = getc(infile)) == EOF || c == '\032') {
data/xfractint-20.4.10/common/parser.c:2409:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      v[vsp].len = strlen(Constants[vsp]);
data/xfractint-20.4.10/common/parser.c:2996:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = getc(openfile);
data/xfractint-20.4.10/common/parser.c:3004:24:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
           while ((c = getc(openfile)) != '\n' && c != EOF && c != '\032')
data/xfractint-20.4.10/common/parser.c:3222:15:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
              strcat(tok->token_str, "-");
data/xfractint-20.4.10/common/parser.c:3225:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(tok->token_str, ",");
data/xfractint-20.4.10/common/parser.c:3232:15:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
              strcat(tok->token_str, "-");
data/xfractint-20.4.10/common/parser.c:3235:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(tok->token_str, ")");
data/xfractint-20.4.10/common/parser.c:3552:19:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      switch (c = getc(open_file)) {
data/xfractint-20.4.10/common/parser.c:3580:33:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         msgbuf[j+k+2] = (char) getc(open_file);
data/xfractint-20.4.10/common/parser.c:3592:22:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         switch (c = getc(open_file)) {
data/xfractint-20.4.10/common/parser.c:3605:20:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
               c = getc(open_file); /* get next character */
data/xfractint-20.4.10/common/parser.c:3623:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            + strlen(sym_buf) + 6);
data/xfractint-20.4.10/common/parser.c:3634:14:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         c = getc(open_file); /* eat spaces */
data/xfractint-20.4.10/common/parser.c:3641:25:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            switch (c = getc(open_file)) {
data/xfractint-20.4.10/common/parser.c:3670:22:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         switch (c = getc(open_file)) {
data/xfractint-20.4.10/common/parser.c:4024:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
   strcpy (msgbuf, "\n");
data/xfractint-20.4.10/common/parser.c:4031:18:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         if((i = fgetc(open_file)) == '\n') {
data/xfractint-20.4.10/common/parser.c:4042:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sprintf(&msgbuf[strlen(msgbuf)], "Error(%d) at line %d:  %Fs\n  ", errors[j].error_number, line_number, ParseErrs(errors[j].error_number));
data/xfractint-20.4.10/common/parser.c:4044:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sprintf(&msgbuf[strlen(msgbuf)], "Error(%d) at line %d:  %s\n  ", errors[j].error_number, line_number, ParseErrs(errors[j].error_number));
data/xfractint-20.4.10/common/parser.c:4046:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      i = strlen(msgbuf);
data/xfractint-20.4.10/common/parser.c:4058:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            chars_in_error = strlen(tok.token_str);
data/xfractint-20.4.10/common/parser.c:4068:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
*/          statement_len += strlen(tok.token_str);
data/xfractint-20.4.10/common/parser.c:4086:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            chars_to_error -= strlen(tok.token_str);
data/xfractint-20.4.10/common/parser.c:4096:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
*/    while (strlen(&msgbuf[i]) <=74 && token_count--) {
data/xfractint-20.4.10/common/parser.c:4103:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(&msgbuf[i]) > 74)
data/xfractint-20.4.10/common/parser.c:4105:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(msgbuf, "\n");
data/xfractint-20.4.10/common/parser.c:4106:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      i = strlen(msgbuf);
data/xfractint-20.4.10/common/parser.c:4108:10:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
         strcat (msgbuf, " ");
data/xfractint-20.4.10/common/parser.c:4115:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      while (chars_in_error-- && strlen(&msgbuf[i]) <=74)
data/xfractint-20.4.10/common/parser.c:4116:10:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
         strcat (msgbuf, "^");
data/xfractint-20.4.10/common/parser.c:4117:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat (msgbuf, "\n");
data/xfractint-20.4.10/common/parser.c:4305:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      chars_in_formula += strlen(this_token.token_str);
data/xfractint-20.4.10/common/printer.c:463:14:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         j = fgetc(PRFILE);
data/xfractint-20.4.10/common/prompts1.c:163:18:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while((c = fgetc(scroll_file)) != EOF && c != '\032') {
data/xfractint-20.4.10/common/prompts1.c:556:16:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
               strncpy(values[curchoice].uval.sval,buf,16);
data/xfractint-20.4.10/common/prompts1.c:564:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      j = strlen(buf);
data/xfractint-20.4.10/common/prompts1.c:673:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if ((int)strlen(buf) <= ret) break;
data/xfractint-20.4.10/common/prompts1.c:702:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
         strncpy(buf,val->uval.sval,16);
data/xfractint-20.4.10/common/prompts1.c:796:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      i = strlen(buf);
data/xfractint-20.4.10/common/prompts1.c:1823:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = getc(infile);
data/xfractint-20.4.10/common/prompts1.c:1836:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = getc(infile);
data/xfractint-20.4.10/common/prompts1.c:1884:14:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         c = getc(infile);
data/xfractint-20.4.10/common/prompts1.c:1896:17:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            c = getc(infile);
data/xfractint-20.4.10/common/prompts1.c:1912:20:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
               c = getc(infile);
data/xfractint-20.4.10/common/prompts1.c:2086:18:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while((c = fgetc(gfe_file)) != EOF && c != '\032') {
data/xfractint-20.4.10/common/prompts1.c:2240:16:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while((c=fgetc(entfile)) != '\n' && c != EOF && c != '\032') {
data/xfractint-20.4.10/common/prompts1.c:2259:37:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while (i++ < startcol && (c = fgetc(entfile)) != EOF && c != '\032') {
data/xfractint-20.4.10/common/prompts1.c:2292:19:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while ((c = fgetc(entfile)) != EOF && c != '\032') {
data/xfractint-20.4.10/common/prompts1.c:2336:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   while (getc(gfe_file) != '{') { }
data/xfractint-20.4.10/common/prompts1.c:2337:16:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   while ((c = getc(gfe_file)) == ' ' || c == '\t' || c == ';') { }
data/xfractint-20.4.10/common/prompts1.c:2341:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = getc(gfe_file);
data/xfractint-20.4.10/common/prompts1.c:2869:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
   strcpy(temp1,"*");
data/xfractint-20.4.10/common/prompts2.c:1197:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 strlen(stereomapname) < sizeof(rds6)-2)
data/xfractint-20.4.10/common/prompts2.c:1202:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         rds6[(sizeof(rds6)-strlen(p)+2)/2] = 0;
data/xfractint-20.4.10/common/prompts2.c:1203:10:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
         strcat(rds6,"[");
data/xfractint-20.4.10/common/prompts2.c:1205:10:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
         strcat(rds6,"]");
data/xfractint-20.4.10/common/prompts2.c:1431:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
             strncpy(DTA.filename,dirEntry->d_name,MAX_NAME);
data/xfractint-20.4.10/common/prompts2.c:1562:7:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      strcpy(dir,".");
data/xfractint-20.4.10/common/prompts2.c:1568:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      tmpmask[(j = strlen(tmpmask) - 1)] = 0; /* strip trailing \ */
data/xfractint-20.4.10/common/prompts2.c:1590:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   masklen = strlen(tmpmask);
data/xfractint-20.4.10/common/prompts2.c:1673:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(tmpmask," ");
data/xfractint-20.4.10/common/prompts2.c:1833:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return(strlen(prompt));
data/xfractint-20.4.10/common/prompts2.c:1847:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(s);
data/xfractint-20.4.10/common/prompts2.c:2014:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   length = strlen(dirname); /* index of last character */
data/xfractint-20.4.10/common/prompts2.c:2092:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         curdir[strlen(curdir)-1] = 0; /* strip trailing slash */
data/xfractint-20.4.10/common/prompts2.c:2720:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if(strlen(newfilename) == 3 &&
data/xfractint-20.4.10/common/prompts2.c:2725:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if(strlen(newfilename) == 2 &&
data/xfractint-20.4.10/common/prompts2.c:2755:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         len = strlen(newfilename);
data/xfractint-20.4.10/common/prompts2.c:2780:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if(strlen(drive) != 0 && GETPATH)
data/xfractint-20.4.10/common/prompts2.c:2782:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if(strlen(dir) != 0 && GETPATH)
data/xfractint-20.4.10/common/prompts2.c:2784:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if(strlen(fname) != 0)
data/xfractint-20.4.10/common/prompts2.c:2786:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if(strlen(ext) != 0)
data/xfractint-20.4.10/common/prompts2.c:2791:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(oldfullpath);
data/xfractint-20.4.10/common/realdos.c:211:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      textxdots = strlen(msg) * xrepeat * 8;
data/xfractint-20.4.10/common/realdos.c:315:4:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
   strcpy(msg,"X");
data/xfractint-20.4.10/common/realdos.c:518:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      i = strlen(buf);
data/xfractint-20.4.10/common/realdos.c:524:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      movecursor(speedrow,17+j+strlen(speedstring));
data/xfractint-20.4.10/common/realdos.c:539:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   i = strlen(speedstring);
data/xfractint-20.4.10/common/realdos.c:635:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     && (i = strlen(speedstring)) > 0) { /* preset current to passed string */
data/xfractint-20.4.10/common/realdos.c:1422:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      i = strlen(buf);
data/xfractint-20.4.10/common/realdos.c:1452:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            offset = strlen(fld);
data/xfractint-20.4.10/common/realdos.c:1458:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               j = strlen(fld);
data/xfractint-20.4.10/common/realdos.c:1466:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            j = strlen(fld);
data/xfractint-20.4.10/common/realdos.c:1487:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (insert && started && strlen(fld) >= (size_t)len)
data/xfractint-20.4.10/common/realdos.c:1503:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               j = strlen(fld);
data/xfractint-20.4.10/common/realdos.c:1509:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if ((size_t)offset >= strlen(fld))
data/xfractint-20.4.10/common/realdos.c:1813:16:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         while(fgetc(cfgfile) != '\n' && !feof(cfgfile));
data/xfractint-20.4.10/common/realdos.c:1817:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      tempstring[strlen(tempstring)-1] = 0; /* zap trailing \n */
data/xfractint-20.4.10/common/slideshw.c:196:15:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if((out=fgetc(fpss)) != '\"' && out != EOF)
data/xfractint-20.4.10/common/slideshw.c:201:16:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   while ((out=fgetc(fpss)) == ' ' || out == '\t' || out == '\n') { }
data/xfractint-20.4.10/common/slideshw.c:211:21:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
         while((out=fgetc(fpss)) != '\n' && out != EOF) { }
data/xfractint-20.4.10/common/slideshw.c:230:15:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if((out=fgetc(fpss)) == ' ' || out == '\t' || out == '\n' || out == EOF)
data/xfractint-20.4.10/common/slideshw.c:255:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len = strlen(buf);
data/xfractint-20.4.10/common/slideshw.c:273:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(buffer,":");
data/xfractint-20.4.10/common/soi.c:42:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
static DBLS equal;
data/xfractint-20.4.10/common/soi.c:56:48:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  register unsigned long eq=*(unsigned long *)&equal;
data/xfractint-20.4.10/common/soi.c:154:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	  if(FABS(sre-re)<equal&&FABS(sim-im)<equal)
data/xfractint-20.4.10/common/soi.c:154:40:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	  if(FABS(sre-re)<equal&&FABS(sim-im)<equal)
data/xfractint-20.4.10/common/soi1.c:35:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
static DBLS equal;
data/xfractint-20.4.10/dos_help/hc.c:517:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(s) + 1;
data/xfractint-20.4.10/dos_help/hc.c:656:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   int p = strlen(s);
data/xfractint-20.4.10/dos_help/hc.c:696:12:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      ch = getc(srcfile);
data/xfractint-20.4.10/dos_help/hc.c:838:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = strlen(title) - 1;
data/xfractint-20.4.10/dos_help/hc.c:851:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if ( strlen(topic[t].title) == len &&
data/xfractint-20.4.10/dos_help/hc.c:984:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   t.title_len = strlen(DOCCONTENTS_TITLE)+1;
data/xfractint-20.4.10/dos_help/hc.c:1035:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (ptr[strlen(ptr)-1] == '\"')
data/xfractint-20.4.10/dos_help/hc.c:1036:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               ptr[strlen(ptr)-1] = '\0';
data/xfractint-20.4.10/dos_help/hc.c:1051:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         ptr = curr + strlen(curr);
data/xfractint-20.4.10/dos_help/hc.c:1072:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               if (ptr[strlen(ptr)-1] == '\"')
data/xfractint-20.4.10/dos_help/hc.c:1073:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  ptr[strlen(ptr)-1] = '\0';
data/xfractint-20.4.10/dos_help/hc.c:1166:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if ((int)strlen(cmd) > 32)
data/xfractint-20.4.10/dos_help/hc.c:1347:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         len = strlen(title[lnum]);
data/xfractint-20.4.10/dos_help/hc.c:1443:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   read(handle, curr, (unsigned)len);
data/xfractint-20.4.10/dos_help/hc.c:1524:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(cmd) != len)
data/xfractint-20.4.10/dos_help/hc.c:1656:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               else if ((int)strlen(cmd+6) > 70)
data/xfractint-20.4.10/dos_help/hc.c:1659:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               else if ((int)strlen(cmd+6) > 60)
data/xfractint-20.4.10/dos_help/hc.c:1705:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               if ((int)strlen(cmd+5) > 32)
data/xfractint-20.4.10/dos_help/hc.c:1930:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  if ((int)strlen(cmd+6) <= 0)
data/xfractint-20.4.10/dos_help/hc.c:1941:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     if ((int)strlen(cmd+6) > 32)
data/xfractint-20.4.10/dos_help/hc.c:2911:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(buf);
data/xfractint-20.4.10/dos_help/hc.c:3077:12:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if ( getc(f1) != getc(f2) )
data/xfractint-20.4.10/dos_help/hc.c:3077:24:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if ( getc(f1) != getc(f2) )
data/xfractint-20.4.10/dos_help/hc.c:3190:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                strlen(cp->id) +    /* id text */
data/xfractint-20.4.10/dos_help/hc.c:3192:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                strlen(cp->name) +  /* name text */
data/xfractint-20.4.10/dos_help/hc.c:3288:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      t = strlen(cp->id);
data/xfractint-20.4.10/dos_help/hc.c:3292:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      t = strlen(cp->name);
data/xfractint-20.4.10/dos_help/hc.c:3538:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      string += strlen(a_link[ctr].name);
data/xfractint-20.4.10/dos_help/hc.c:3547:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      string += strlen(label[ctr].name) + 1;
data/xfractint-20.4.10/dos_help/hc.c:3556:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      string += strlen(plabel[ctr].name) + 1;
data/xfractint-20.4.10/dos_help/hc.c:3572:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      string += strlen(contents[ctr].id) + 1;
data/xfractint-20.4.10/dos_help/hc.c:3573:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      string += strlen(contents[ctr].name) + 1;
data/xfractint-20.4.10/dos_help/hc.c:3575:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         string += strlen(contents[ctr].topic_name[ctr2]) + 1;
data/xfractint-20.4.10/dos_help/hc.c:3640:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   read(exe, (char *)&hs, 10);
data/xfractint-20.4.10/dos_help/hc.c:3649:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   read(hlp, (char *)&hs, sizeof(long)+sizeof(int));
data/xfractint-20.4.10/dos_help/hc.c:3665:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      read(hlp, buffer, size);
data/xfractint-20.4.10/dos_help/hc.c:3695:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   read(exe, (char *)&hs, 10);
data/xfractint-20.4.10/dos_help/hc.c:3698:4:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   read(exe, (char *)&hs, 12);
data/xfractint-20.4.10/headers/helpcom.h:608:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                           width = strlen(page_text);
data/xfractint-20.4.10/headers/helpcom.h:763:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     if ( !DO_PRINT(page_text, strlen(page_text)) )
data/xfractint-20.4.10/unix/diskvidu.c:206:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   memcpy(buf,msg,strlen(msg));
data/xfractint-20.4.10/unix/general.c:401:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return read(handle, buf, len);
data/xfractint-20.4.10/unix/general.c:428:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strlen(a);
data/xfractint-20.4.10/unix/general.c:531:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(info->info_id,(char *)bufPtr,8);
data/xfractint-20.4.10/unix/general.c:533:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy((char *)bufPtr,info->info_id,8);
data/xfractint-20.4.10/unix/unix.c:286:2:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(fullpathname,"/");
data/xfractint-20.4.10/unix/unix.c:295:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(fullpathname,"/");
data/xfractint-20.4.10/unix/unix.c:391:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if((length = strlen(template)) == 0)
data/xfractint-20.4.10/unix/unix.c:421:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(dir,&template[offset],min(len,FILE_MAX_DIR));
data/xfractint-20.4.10/unix/unix.c:442:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(fname,&template[offset],min(len,FILE_MAX_FNAME));
data/xfractint-20.4.10/unix/unix.c:451:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(ext,&template[offset],FILE_MAX_EXT);
data/xfractint-20.4.10/unix/unix.c:457:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
         strncpy(fname,&template[offset],FILE_MAX_FNAME);
data/xfractint-20.4.10/unix/unixscr.c:986:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
        usleep(10000);
data/xfractint-20.4.10/unix/unixscr.c:1449:9:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return getchar();
data/xfractint-20.4.10/unix/unixscr.c:1453:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	status = read(0,&ch,1);
data/xfractint-20.4.10/unix/xfcurses.c:213:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int i, j, n = strlen(str);
data/xfractint-20.4.10/unix/xfcurses.c:596:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		     ptr1, strlen(ptr1));
data/xfractint-20.4.10/unix/xfcurses.c:598:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    usleep(100000);
data/xfractint-20.4.10/unix/xfcurses.c:625:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (ptr1 && strlen(ptr1)>j) j = strlen(ptr1);
data/xfractint-20.4.10/unix/xfcurses.c:625:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (ptr1 && strlen(ptr1)>j) j = strlen(ptr1);
data/xfractint-20.4.10/unix/xfcurses.c:646:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
  usleep(10000);

ANALYSIS SUMMARY:

Hits = 1526
Lines analyzed = 96309 in approximately 2.35 seconds (41011 lines/second)
Physical Source Lines of Code (SLOC) = 77724
Hits@level = [0] 322 [1] 289 [2] 826 [3]  25 [4] 386 [5]   0
Hits@level+ = [0+] 1848 [1+] 1526 [2+] 1237 [3+] 411 [4+] 386 [5+]   0
Hits/KSLOC@level+ = [0+] 23.7764 [1+] 19.6336 [2+] 15.9153 [3+] 5.28794 [4+] 4.96629 [5+]   0
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.