Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/z88-13.0.0+dfsg2/src/rea88x.c Examining data/z88-13.0.0+dfsg2/src/r1y88i.c Examining data/z88-13.0.0+dfsg2/src/ale88e.c Examining data/z88-13.0.0+dfsg2/src/dyn88x.c Examining data/z88-13.0.0+dfsg2/src/stop88g.c Examining data/z88-13.0.0+dfsg2/src/slqu88.c Examining data/z88-13.0.0+dfsg2/src/m9.c Examining data/z88-13.0.0+dfsg2/src/z88h.h Examining data/z88-13.0.0+dfsg2/src/riy88d.c Examining data/z88-13.0.0+dfsg2/src/gxi288.c Examining data/z88-13.0.0+dfsg2/src/lan88v.c Examining data/z88-13.0.0+dfsg2/src/g1i188.c Examining data/z88-13.0.0+dfsg2/src/m16.c Examining data/z88-13.0.0+dfsg2/src/rdy88h.c Examining data/z88-13.0.0+dfsg2/src/lan88i2.c Examining data/z88-13.0.0+dfsg2/src/z88b.c Examining data/z88-13.0.0+dfsg2/src/m2.c Examining data/z88-13.0.0+dfsg2/src/stop88v.c Examining data/z88-13.0.0+dfsg2/src/hexa88.c Examining data/z88-13.0.0+dfsg2/src/lan88i1.c Examining data/z88-13.0.0+dfsg2/src/isod88.c Examining data/z88-13.0.0+dfsg2/src/z88n.c Examining data/z88-13.0.0+dfsg2/src/hpla88.c Examining data/z88-13.0.0+dfsg2/src/riy88.c Examining data/z88-13.0.0+dfsg2/src/bapla88.c Examining data/z88-13.0.0+dfsg2/src/z88ci.c Examining data/z88-13.0.0+dfsg2/src/spur88.c Examining data/z88-13.0.0+dfsg2/src/bcshe88.c Examining data/z88-13.0.0+dfsg2/src/dnas88.c Examining data/z88-13.0.0+dfsg2/src/who88x.c Examining data/z88-13.0.0+dfsg2/src/stop88i.c Examining data/z88-13.0.0+dfsg2/src/bspla88.c Examining data/z88-13.0.0+dfsg2/src/wlog88g.c Examining data/z88-13.0.0+dfsg2/src/z88f.h Examining data/z88-13.0.0+dfsg2/src/sspl88.c Examining data/z88-13.0.0+dfsg2/src/wlog88v.c Examining data/z88-13.0.0+dfsg2/src/r4y88i.c Examining data/z88-13.0.0+dfsg2/src/who88d.c Examining data/z88-13.0.0+dfsg2/src/z88i2.c Examining data/z88-13.0.0+dfsg2/src/w4y88i.c Examining data/z88-13.0.0+dfsg2/src/m1.c Examining data/z88-13.0.0+dfsg2/src/ale88d.c Examining data/z88-13.0.0+dfsg2/src/wria88x.c Examining data/z88-13.0.0+dfsg2/src/mc188n.c Examining data/z88-13.0.0+dfsg2/src/who88f.c Examining data/z88-13.0.0+dfsg2/src/z88e.c Examining data/z88-13.0.0+dfsg2/src/cosm88.c Examining data/z88-13.0.0+dfsg2/src/z88bi.c Examining data/z88-13.0.0+dfsg2/src/wlog88h.c Examining data/z88-13.0.0+dfsg2/src/rcol88c.c Examining data/z88-13.0.0+dfsg2/src/who88i1.c Examining data/z88-13.0.0+dfsg2/src/stop88d.c Examining data/z88-13.0.0+dfsg2/src/wrim88h.c Examining data/z88-13.0.0+dfsg2/src/nast88.c Examining data/z88-13.0.0+dfsg2/src/cb88o.c Examining data/z88-13.0.0+dfsg2/src/g4i188.c Examining data/z88-13.0.0+dfsg2/src/mc588n.c Examining data/z88-13.0.0+dfsg2/src/wlog88c.c Examining data/z88-13.0.0+dfsg2/src/z88o.c Examining data/z88-13.0.0+dfsg2/src/who88i2.c Examining data/z88-13.0.0+dfsg2/src/z88n.h Examining data/z88-13.0.0+dfsg2/src/ri588.c Examining data/z88-13.0.0+dfsg2/src/z88i.h Examining data/z88-13.0.0+dfsg2/src/rni88.c Examining data/z88-13.0.0+dfsg2/src/spla88.c Examining data/z88-13.0.0+dfsg2/src/bhpla88.c Examining data/z88-13.0.0+dfsg2/src/lqua88.c Examining data/z88-13.0.0+dfsg2/src/dyn88i1.c Examining data/z88-13.0.0+dfsg2/src/dyn88e.c Examining data/z88-13.0.0+dfsg2/src/m4.c Examining data/z88-13.0.0+dfsg2/src/who88h.c Examining data/z88-13.0.0+dfsg2/src/wrim88d.c Examining data/z88-13.0.0+dfsg2/src/g1i388.c Examining data/z88-13.0.0+dfsg2/src/lan88f.c Examining data/z88-13.0.0+dfsg2/src/koi88x.c Examining data/z88-13.0.0+dfsg2/src/lan88o.c Examining data/z88-13.0.0+dfsg2/src/z88cc.c Examining data/z88-13.0.0+dfsg2/src/bhexa88.c Examining data/z88-13.0.0+dfsg2/src/z88v.c Examining data/z88-13.0.0+dfsg2/src/z88a.c Examining data/z88-13.0.0+dfsg2/src/fuvs88.c Examining data/z88-13.0.0+dfsg2/src/ale88n.c Examining data/z88-13.0.0+dfsg2/src/lan88e.c Examining data/z88-13.0.0+dfsg2/src/ri188.c Examining data/z88-13.0.0+dfsg2/src/g5i188.c Examining data/z88-13.0.0+dfsg2/src/gxi588.c Examining data/z88-13.0.0+dfsg2/src/cshe88.c Examining data/z88-13.0.0+dfsg2/src/wrim88g.c Examining data/z88-13.0.0+dfsg2/src/lan88d.c Examining data/z88-13.0.0+dfsg2/src/z88g.c Examining data/z88-13.0.0+dfsg2/src/dyn88n.c Examining data/z88-13.0.0+dfsg2/src/z88tx.c Examining data/z88-13.0.0+dfsg2/src/clr88.c Examining data/z88-13.0.0+dfsg2/src/ale88i.c Examining data/z88-13.0.0+dfsg2/src/apla88.c Examining data/z88-13.0.0+dfsg2/src/stop88n.c Examining data/z88-13.0.0+dfsg2/src/z88e.h Examining data/z88-13.0.0+dfsg2/src/sspu88.c Examining data/z88-13.0.0+dfsg2/src/sub88x.c Examining data/z88-13.0.0+dfsg2/src/rcoo88.c Examining data/z88-13.0.0+dfsg2/src/sapl88.c Examining data/z88-13.0.0+dfsg2/src/stet88.c Examining data/z88-13.0.0+dfsg2/src/wlog88e.c Examining data/z88-13.0.0+dfsg2/src/z88h.c Examining data/z88-13.0.0+dfsg2/src/wlog88d.c Examining data/z88-13.0.0+dfsg2/src/z88com.h Examining data/z88-13.0.0+dfsg2/src/bqshe88.c Examining data/z88-13.0.0+dfsg2/src/dyn88v.c Examining data/z88-13.0.0+dfsg2/src/ale88x.c Examining data/z88-13.0.0+dfsg2/src/ale88f.c Examining data/z88-13.0.0+dfsg2/src/ale88g.c Examining data/z88-13.0.0+dfsg2/src/m15.c Examining data/z88-13.0.0+dfsg2/src/stop88e.c Examining data/z88-13.0.0+dfsg2/src/who88n.c Examining data/z88-13.0.0+dfsg2/src/z88d.c Examining data/z88-13.0.0+dfsg2/src/g1i488.c Examining data/z88-13.0.0+dfsg2/src/ale88h.c Examining data/z88-13.0.0+dfsg2/src/z88fx.c Examining data/z88-13.0.0+dfsg2/src/dyn88d.c Examining data/z88-13.0.0+dfsg2/src/who88g.c Examining data/z88-13.0.0+dfsg2/src/z88ai.c Examining data/z88-13.0.0+dfsg2/src/z88i1.c Examining data/z88-13.0.0+dfsg2/src/mc488n.c Examining data/z88-13.0.0+dfsg2/src/ale88o.c Examining data/z88-13.0.0+dfsg2/src/z88com.c Examining data/z88-13.0.0+dfsg2/src/z88o.h Examining data/z88-13.0.0+dfsg2/src/mc288n.c Examining data/z88-13.0.0+dfsg2/src/stop88h.c Examining data/z88-13.0.0+dfsg2/src/z88f.c Examining data/z88-13.0.0+dfsg2/src/stop88f.c Examining data/z88-13.0.0+dfsg2/src/g2i188.c Examining data/z88-13.0.0+dfsg2/src/sqsh88.c Examining data/z88-13.0.0+dfsg2/src/lan88g.c Examining data/z88-13.0.0+dfsg2/src/fr_func.c Examining data/z88-13.0.0+dfsg2/src/m12.c Examining data/z88-13.0.0+dfsg2/src/z88g.h Examining data/z88-13.0.0+dfsg2/src/stop88x.c Examining data/z88-13.0.0+dfsg2/src/lan88n.c Examining data/z88-13.0.0+dfsg2/src/prfl88.c Examining data/z88-13.0.0+dfsg2/src/ri188i.c Examining data/z88-13.0.0+dfsg2/src/shpl88.c Examining data/z88-13.0.0+dfsg2/src/lan88c.c Examining data/z88-13.0.0+dfsg2/src/blqua88.c Examining data/z88-13.0.0+dfsg2/src/btetr88.c Examining data/z88-13.0.0+dfsg2/src/dyn88o.c Examining data/z88-13.0.0+dfsg2/src/wlog88i2.c Examining data/z88-13.0.0+dfsg2/src/g3i188.c Examining data/z88-13.0.0+dfsg2/src/dyn88i2.c Examining data/z88-13.0.0+dfsg2/src/ri588i.c Examining data/z88-13.0.0+dfsg2/src/subn88.c Examining data/z88-13.0.0+dfsg2/src/wlog88o.c Examining data/z88-13.0.0+dfsg2/src/oc88.c Examining data/z88-13.0.0+dfsg2/src/lan88x.c Examining data/z88-13.0.0+dfsg2/src/who88v.c Examining data/z88-13.0.0+dfsg2/src/z88v.h Examining data/z88-13.0.0+dfsg2/src/ale88v.c Examining data/z88-13.0.0+dfsg2/src/lan88h.c Examining data/z88-13.0.0+dfsg2/src/z88x.c Examining data/z88-13.0.0+dfsg2/src/bspur88.c Examining data/z88-13.0.0+dfsg2/src/z88x.h Examining data/z88-13.0.0+dfsg2/src/tetr88.c Examining data/z88-13.0.0+dfsg2/src/m3.c Examining data/z88-13.0.0+dfsg2/src/shex88.c Examining data/z88-13.0.0+dfsg2/src/siso88.c Examining data/z88-13.0.0+dfsg2/src/span88.c Examining data/z88-13.0.0+dfsg2/src/who88e.c Examining data/z88-13.0.0+dfsg2/src/mc388n.c Examining data/z88-13.0.0+dfsg2/src/dyn88f.c Examining data/z88-13.0.0+dfsg2/src/forc88.c Examining data/z88-13.0.0+dfsg2/src/vend88.c Examining data/z88-13.0.0+dfsg2/src/m10.c Examining data/z88-13.0.0+dfsg2/src/choy88.c Examining data/z88-13.0.0+dfsg2/src/z88math.h Examining data/z88-13.0.0+dfsg2/src/scsh88.c Examining data/z88-13.0.0+dfsg2/src/join88.c Examining data/z88-13.0.0+dfsg2/src/qshe88.c Examining data/z88-13.0.0+dfsg2/src/z88d.h Examining data/z88-13.0.0+dfsg2/src/wrim88e.c Examining data/z88-13.0.0+dfsg2/src/jaco88.c Examining data/z88-13.0.0+dfsg2/src/ale88c.c Examining data/z88-13.0.0+dfsg2/src/cb88c.c Examining data/z88-13.0.0+dfsg2/src/wlog88f.c Examining data/z88-13.0.0+dfsg2/src/wlog88i1.c Examining data/z88-13.0.0+dfsg2/src/wlog88n.c Examining data/z88-13.0.0+dfsg2/src/wlog88x.c Examining data/z88-13.0.0+dfsg2/src/wria88f.c Examining data/z88-13.0.0+dfsg2/src/wria88i.c Examining data/z88-13.0.0+dfsg2/src/wrim88f.c Examining data/z88-13.0.0+dfsg2/src/wrim88i.c Examining data/z88-13.0.0+dfsg2/src/wrim88n.c Examining data/z88-13.0.0+dfsg2/src/wrim88x.c FINAL RESULTS: data/z88-13.0.0+dfsg2/src/cb88c.c:74:1: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:76:1: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:79:7: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:105:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cmess,cbytes); data/z88-13.0.0+dfsg2/src/cb88c.c:109:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cmess,cbytes); data/z88-13.0.0+dfsg2/src/cb88c.c:113:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cmess,cbytes); data/z88-13.0.0+dfsg2/src/cb88c.c:117:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cmess,cbytes); data/z88-13.0.0+dfsg2/src/cb88c.c:121:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cmess,cbytes); data/z88-13.0.0+dfsg2/src/cb88c.c:124:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cmess,cbytes); data/z88-13.0.0+dfsg2/src/cb88c.c:177:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system("z88v"); data/z88-13.0.0+dfsg2/src/cb88c.c:182:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:184:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:187:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:205:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system("z88n"); data/z88-13.0.0+dfsg2/src/cb88c.c:210:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:212:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:215:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:233:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system("z88d"); data/z88-13.0.0+dfsg2/src/cb88c.c:238:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:240:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:243:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:261:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system("z88e"); data/z88-13.0.0+dfsg2/src/cb88c.c:266:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:268:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:271:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:289:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system("z88g"); data/z88-13.0.0+dfsg2/src/cb88c.c:294:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:296:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:299:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:317:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system("z88h"); data/z88-13.0.0+dfsg2/src/cb88c.c:322:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:324:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:327:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:345:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system("z88o"); data/z88-13.0.0+dfsg2/src/cb88c.c:350:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:352:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:355:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:373:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CEDITOR); data/z88-13.0.0+dfsg2/src/cb88c.c:375:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:380:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:382:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:385:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:403:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CEDITOR); data/z88-13.0.0+dfsg2/src/cb88c.c:405:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:420:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:422:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:425:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:443:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CEDITOR); data/z88-13.0.0+dfsg2/src/cb88c.c:445:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:450:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:452:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:455:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:473:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CEDITOR); data/z88-13.0.0+dfsg2/src/cb88c.c:475:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:480:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:482:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:485:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:503:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CEDITOR); data/z88-13.0.0+dfsg2/src/cb88c.c:505:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:510:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:512:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:515:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:533:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CEDITOR); data/z88-13.0.0+dfsg2/src/cb88c.c:535:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:540:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:542:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:545:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:563:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CEDITOR); data/z88-13.0.0+dfsg2/src/cb88c.c:565:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:570:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:572:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:575:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:593:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CEDITOR); data/z88-13.0.0+dfsg2/src/cb88c.c:595:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:600:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:602:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:605:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:623:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CEDITOR); data/z88-13.0.0+dfsg2/src/cb88c.c:625:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:630:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:632:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:635:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:653:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CEDITOR); data/z88-13.0.0+dfsg2/src/cb88c.c:655:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:660:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:662:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:665:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:683:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CEDITOR); data/z88-13.0.0+dfsg2/src/cb88c.c:685:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:690:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:692:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:695:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:713:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CEDITOR); data/z88-13.0.0+dfsg2/src/cb88c.c:715:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:720:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:722:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:725:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:743:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CEDITOR); data/z88-13.0.0+dfsg2/src/cb88c.c:745:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:750:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:752:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:755:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:773:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system("z88x -i1tx"); data/z88-13.0.0+dfsg2/src/cb88c.c:778:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:780:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:783:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:801:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system("z88x -iatx"); data/z88-13.0.0+dfsg2/src/cb88c.c:806:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:808:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:811:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:829:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system("z88x -nitx"); data/z88-13.0.0+dfsg2/src/cb88c.c:834:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:836:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:839:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:857:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system("z88x -i1fx"); data/z88-13.0.0+dfsg2/src/cb88c.c:862:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:864:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:867:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:885:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system("z88x -iafx"); data/z88-13.0.0+dfsg2/src/cb88c.c:890:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:892:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:895:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:913:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system("z88x -nifx"); data/z88-13.0.0+dfsg2/src/cb88c.c:918:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:920:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:923:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:941:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system("z88f -c"); data/z88-13.0.0+dfsg2/src/cb88c.c:946:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:948:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:951:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:969:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system("z88f -t"); data/z88-13.0.0+dfsg2/src/cb88c.c:974:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:976:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:979:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:997:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system("z88i1"); data/z88-13.0.0+dfsg2/src/cb88c.c:1002:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:1004:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:1007:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:1025:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system("z88i2 -c"); data/z88-13.0.0+dfsg2/src/cb88c.c:1030:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:1032:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:1035:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:1053:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system("z88i2 -s"); data/z88-13.0.0+dfsg2/src/cb88c.c:1058:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:1060:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:1063:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88c.c:1081:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system("z88par"); data/z88-13.0.0+dfsg2/src/cb88c.c:1086:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88c.c:1088:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88c.c:1091:9: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88o.c:359:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cmess,cbytes); data/z88-13.0.0+dfsg2/src/cb88o.c:363:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cmess,cbytes); data/z88-13.0.0+dfsg2/src/cb88o.c:367:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cmess,cbytes); data/z88-13.0.0+dfsg2/src/cb88o.c:371:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cmess,cbytes); data/z88-13.0.0+dfsg2/src/cb88o.c:375:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cmess,cbytes); data/z88-13.0.0+dfsg2/src/cb88o.c:378:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cmess,cbytes); data/z88-13.0.0+dfsg2/src/cb88o.c:397:1: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command,CBROWSER); data/z88-13.0.0+dfsg2/src/cb88o.c:399:1: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(command,CPREFIX); data/z88-13.0.0+dfsg2/src/cb88o.c:402:7: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. iret= system(command); data/z88-13.0.0+dfsg2/src/cb88o.c:473:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cstrn,cfilename); data/z88-13.0.0+dfsg2/src/clr88.c:50:1: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system("tput clear"); data/z88-13.0.0+dfsg2/src/dnas88.c:221:7: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(c2zeile,"%s %s %ld",cdummy,cdummy2,&ispc); data/z88-13.0.0+dfsg2/src/dnas88.c:228:9: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(c2zeile,"%s %s %ld",cdummy,cdummy2,&iload); data/z88-13.0.0+dfsg2/src/dnas88.c:274:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cstring,"%s %ld %lf %lf",cdummy,&idummy,&emod,&rnue); data/z88-13.0.0+dfsg2/src/dnas88.c:289:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cstring,"%s %ld",cdummy,&idummy); data/z88-13.0.0+dfsg2/src/dnas88.c:296:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cstring,"%s %ld %ld %ld %lf %lf %lf %lf", data/z88-13.0.0+dfsg2/src/dnas88.c:312:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cstring,"%s %ld %ld %lf %lf %lf %ld %ld", data/z88-13.0.0+dfsg2/src/dnas88.c:488:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cstring,"%s %ld %ld %lf %lf %lf", data/z88-13.0.0+dfsg2/src/dnas88.c:511:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cstring,"%s %ld %ld %ld %ld %ld %ld %ld %ld", data/z88-13.0.0+dfsg2/src/dnas88.c:564:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cstring,"%s %ld %ld %ld %lf",cdummy,&idummy,&nkn,&ifg,&wert); data/z88-13.0.0+dfsg2/src/dnas88.c:576:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cstring,"%s %ld %ld %ld %lf %lf %lf %lf", data/z88-13.0.0+dfsg2/src/dnas88.c:606:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cstring,"%s %ld %ld %lf %lf %lf %ld %ld", data/z88-13.0.0+dfsg2/src/dyn88d.c:151:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXKOI); data/z88-13.0.0+dfsg2/src/dyn88d.c:153:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXK); data/z88-13.0.0+dfsg2/src/dyn88d.c:155:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXE); data/z88-13.0.0+dfsg2/src/dyn88d.c:157:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXNFG); data/z88-13.0.0+dfsg2/src/dyn88d.c:159:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXNEG); data/z88-13.0.0+dfsg2/src/dyn88e.c:155:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXKOI); data/z88-13.0.0+dfsg2/src/dyn88e.c:157:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXK); data/z88-13.0.0+dfsg2/src/dyn88e.c:159:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXE); data/z88-13.0.0+dfsg2/src/dyn88e.c:161:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXNFG); data/z88-13.0.0+dfsg2/src/dyn88e.c:163:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXNEG); data/z88-13.0.0+dfsg2/src/dyn88f.c:164:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXGS); data/z88-13.0.0+dfsg2/src/dyn88f.c:166:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXKOI); data/z88-13.0.0+dfsg2/src/dyn88f.c:168:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXK); data/z88-13.0.0+dfsg2/src/dyn88f.c:170:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXE); data/z88-13.0.0+dfsg2/src/dyn88f.c:172:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXNFG); data/z88-13.0.0+dfsg2/src/dyn88f.c:174:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXNEG); data/z88-13.0.0+dfsg2/src/dyn88f.c:176:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXPR); data/z88-13.0.0+dfsg2/src/dyn88i1.c:147:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXGS); data/z88-13.0.0+dfsg2/src/dyn88i1.c:149:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXKOI); data/z88-13.0.0+dfsg2/src/dyn88i1.c:151:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXK); data/z88-13.0.0+dfsg2/src/dyn88i1.c:153:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXE); data/z88-13.0.0+dfsg2/src/dyn88i1.c:155:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXNFG); data/z88-13.0.0+dfsg2/src/dyn88i1.c:157:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXNEG); data/z88-13.0.0+dfsg2/src/dyn88i1.c:159:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXIEZ); data/z88-13.0.0+dfsg2/src/dyn88i2.c:173:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXGS); data/z88-13.0.0+dfsg2/src/dyn88i2.c:175:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXKOI); data/z88-13.0.0+dfsg2/src/dyn88i2.c:177:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXK); data/z88-13.0.0+dfsg2/src/dyn88i2.c:179:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXE); data/z88-13.0.0+dfsg2/src/dyn88i2.c:181:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXNFG); data/z88-13.0.0+dfsg2/src/dyn88i2.c:183:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXNEG); data/z88-13.0.0+dfsg2/src/dyn88i2.c:185:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,CFORMA,cdummy,&MAXPR); data/z88-13.0.0+dfsg2/src/dyn88n.c:141:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXSE); data/z88-13.0.0+dfsg2/src/dyn88n.c:143:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXESS); data/z88-13.0.0+dfsg2/src/dyn88n.c:145:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXKSS); data/z88-13.0.0+dfsg2/src/dyn88n.c:147:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXAN); data/z88-13.0.0+dfsg2/src/dyn88n.c:158:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXK); data/z88-13.0.0+dfsg2/src/dyn88n.c:160:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXE); data/z88-13.0.0+dfsg2/src/dyn88n.c:162:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXNFG); data/z88-13.0.0+dfsg2/src/dyn88n.c:164:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXNEG); data/z88-13.0.0+dfsg2/src/dyn88o.c:147:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXKOI); data/z88-13.0.0+dfsg2/src/dyn88o.c:149:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXE); data/z88-13.0.0+dfsg2/src/dyn88o.c:151:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXK); data/z88-13.0.0+dfsg2/src/dyn88o.c:153:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXNEG); data/z88-13.0.0+dfsg2/src/dyn88o.c:155:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXRBD); data/z88-13.0.0+dfsg2/src/dyn88o.c:157:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXPR); data/z88-13.0.0+dfsg2/src/dyn88o.c:159:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXGP); data/z88-13.0.0+dfsg2/src/dyn88v.c:120:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXSE); data/z88-13.0.0+dfsg2/src/dyn88v.c:122:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXESS); data/z88-13.0.0+dfsg2/src/dyn88v.c:124:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXKSS); data/z88-13.0.0+dfsg2/src/dyn88v.c:126:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXAN); data/z88-13.0.0+dfsg2/src/dyn88v.c:137:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXGS); data/z88-13.0.0+dfsg2/src/dyn88v.c:139:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXKOI); data/z88-13.0.0+dfsg2/src/dyn88v.c:141:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXK); data/z88-13.0.0+dfsg2/src/dyn88v.c:143:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXE); data/z88-13.0.0+dfsg2/src/dyn88v.c:145:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXNFG); data/z88-13.0.0+dfsg2/src/dyn88v.c:147:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXNEG); data/z88-13.0.0+dfsg2/src/dyn88v.c:149:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXPR); data/z88-13.0.0+dfsg2/src/dyn88v.c:151:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXIEZ); data/z88-13.0.0+dfsg2/src/dyn88v.c:153:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXRBD); data/z88-13.0.0+dfsg2/src/dyn88v.c:155:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXGP); data/z88-13.0.0+dfsg2/src/dyn88x.c:166:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXKOI); data/z88-13.0.0+dfsg2/src/dyn88x.c:168:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXK); data/z88-13.0.0+dfsg2/src/dyn88x.c:170:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXE); data/z88-13.0.0+dfsg2/src/dyn88x.c:172:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXNFG); data/z88-13.0.0+dfsg2/src/dyn88x.c:174:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXNEG); data/z88-13.0.0+dfsg2/src/dyn88x.c:176:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXPR); data/z88-13.0.0+dfsg2/src/fr_func.c:56:1: [4] (buffer) scanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. scanf("%s",cstring); data/z88-13.0.0+dfsg2/src/g4i188.c:604:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(clina,cline); data/z88-13.0.0+dfsg2/src/gxi288.c:180:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(clina,cline); data/z88-13.0.0+dfsg2/src/m16.c:363:1: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD,&npr); data/z88-13.0.0+dfsg2/src/m16.c:378:3: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD,&nep[i]); data/z88-13.0.0+dfsg2/src/m16.c:394:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD BPG BPG BPD BPD BPD,&idummy,&rdummy,&sdummy, data/z88-13.0.0+dfsg2/src/m16.c:409:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD BPG BPD BPD BPD,&idummy,&rdummy, data/z88-13.0.0+dfsg2/src/m16.c:424:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD BPG BPD BPD BPD BPD BPD BPD, data/z88-13.0.0+dfsg2/src/m16.c:442:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD BPG BPG BPG BPD BPD BPD BPD BPD BPD BPD BPD, data/z88-13.0.0+dfsg2/src/m16.c:461:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD BPG BPG BPG BPD BPD BPD BPD, data/z88-13.0.0+dfsg2/src/m16.c:478:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD BPG BPG BPD BPD BPD BPD, data/z88-13.0.0+dfsg2/src/m16.c:492:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD BPG,&idummy,&rdummy); data/z88-13.0.0+dfsg2/src/m3.c:131:15: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 1) fprintf(fo3,"\n\nElement # = " P5D " Typ = Stab in Ebene\ data/z88-13.0.0+dfsg2/src/m3.c:133:15: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 2) fprintf(fo3,"\n\nelement # = " P5D " type = truss in plane\ data/z88-13.0.0+dfsg2/src/m3.c:182:15: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 1) fprintf(fo3,"\n\nElement # = " P5D " Typ = Stab im Raum\ data/z88-13.0.0+dfsg2/src/m3.c:184:15: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 2) fprintf(fo3,"\n\nelement # = " P5D " type = truss in space\ data/z88-13.0.0+dfsg2/src/m3.c:232:1: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo3,NL P11EB P11EB P11EB P11EB P11EB P11E, data/z88-13.0.0+dfsg2/src/m3.c:323:1: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo3,NL P11EB P11EB P11EB P11EB P11EB P11E, data/z88-13.0.0+dfsg2/src/m3.c:382:1: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo3,NL P11E " " P11E\ data/z88-13.0.0+dfsg2/src/nast88.c:208:7: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(c2zeile,"%s %s %ld",cdummy,cdummy2,&ispc); data/z88-13.0.0+dfsg2/src/nast88.c:215:9: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(c2zeile,"%s %s %ld",cdummy,cdummy2,&iload); data/z88-13.0.0+dfsg2/src/nast88.c:261:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cstring,"%s %ld %lf %lf",cdummy,&idummy,&emod,&rnue); data/z88-13.0.0+dfsg2/src/nast88.c:277:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cstring,"%s %ld %ld %lf",cdummy,&idummy,&jdummy,&qpara); data/z88-13.0.0+dfsg2/src/nast88.c:284:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cstring,"%s %ld",cdummy,&idummy); data/z88-13.0.0+dfsg2/src/nast88.c:291:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cstring,"%s %ld %ld %ld %lf %lf %lf %lf", data/z88-13.0.0+dfsg2/src/nast88.c:309:7: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cstring,"%s %ld %ld %lf",cdummy,&idummy,&jdummy,&rdummy); data/z88-13.0.0+dfsg2/src/nast88.c:406:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cstring,"%s %ld %ld %lf %lf %lf", data/z88-13.0.0+dfsg2/src/nast88.c:423:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cstring,"%s %ld %ld %ld %ld %ld %ld %ld %ld", data/z88-13.0.0+dfsg2/src/nast88.c:480:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cstring,"%s %ld %ld %ld %ld %ld %ld %ld %ld", data/z88-13.0.0+dfsg2/src/nast88.c:516:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cstring,"%s %ld %ld %ld %ld %ld %ld %ld %ld", data/z88-13.0.0+dfsg2/src/nast88.c:532:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cstring,"%s %ld %ld %ld %lf",cdummy,&idummy,&nkn,&ipuf,&wert); data/z88-13.0.0+dfsg2/src/nast88.c:558:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cstring,"%s %ld %ld %ld %lf %lf %lf %lf", data/z88-13.0.0+dfsg2/src/nast88.c:702:7: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cstring,"%s %ld %ld %lf",cdummy,&idummy,&jdummy,&rdummy); data/z88-13.0.0+dfsg2/src/prfl88.c:136:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo1,"Element#" B5D " Normallast" B13E " Schub r" B13E\ data/z88-13.0.0+dfsg2/src/prfl88.c:140:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo1,"element#" B5D " normal load" B13E " shear r" B13E\ data/z88-13.0.0+dfsg2/src/prfl88.c:151:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo1,"Element#" B5D " Druck" B13E " Knoten" B5D B5D B5D NL, data/z88-13.0.0+dfsg2/src/prfl88.c:154:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo1,"element#" B5D " pressure" B13E " nodes" B5D B5D B5D NL, data/z88-13.0.0+dfsg2/src/prfl88.c:164:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo1,"Element#" B5D " Druck" B13E\ data/z88-13.0.0+dfsg2/src/prfl88.c:169:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo1,"element#" B5D " pressure " B13E\ data/z88-13.0.0+dfsg2/src/prfl88.c:181:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo1, data/z88-13.0.0+dfsg2/src/prfl88.c:188:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo1, data/z88-13.0.0+dfsg2/src/prfl88.c:202:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo1, data/z88-13.0.0+dfsg2/src/prfl88.c:208:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo1, data/z88-13.0.0+dfsg2/src/prfl88.c:221:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo1,"Element#" B5D " Normallast" B13E " Schub r" B13E\ data/z88-13.0.0+dfsg2/src/prfl88.c:225:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo1,"element#" B5D " normal load" B13E " shear r" B13E\ data/z88-13.0.0+dfsg2/src/prfl88.c:236:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo1,"Element#" B5D " Druck" B13E NL,nep[j],pres[j]); data/z88-13.0.0+dfsg2/src/prfl88.c:238:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo1,"Element#" B5D " pressure" B13E NL,nep[j],pres[j]); data/z88-13.0.0+dfsg2/src/rcol88c.c:99:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %s",cdummy,CEDITOR); data/z88-13.0.0+dfsg2/src/rcol88c.c:101:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %s",cdummy,CBROWSER); data/z88-13.0.0+dfsg2/src/rcol88c.c:103:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %s",cdummy,CPREFIX); data/z88-13.0.0+dfsg2/src/rcoo88.c:119:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %s",cdummy,CBROWSER); data/z88-13.0.0+dfsg2/src/rcoo88.c:121:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %s",cdummy,CPREFIX); data/z88-13.0.0+dfsg2/src/rcoo88.c:158:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %d",cdummy,&IW_DRAWAR); data/z88-13.0.0+dfsg2/src/rcoo88.c:160:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %d",cdummy,&IH_DRAWAR); data/z88-13.0.0+dfsg2/src/rcoo88.c:162:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %s",cdummy,CPANGO_FONT); data/z88-13.0.0+dfsg2/src/rcoo88.c:164:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %s",cdummy,CPANGO_SIZE); data/z88-13.0.0+dfsg2/src/rcoo88.c:185:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %lf",cdummy,&fycor); data/z88-13.0.0+dfsg2/src/rcoo88.c:189:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %f %f %f %f",cdummy,&f0,&f1,&f2,&f3); data/z88-13.0.0+dfsg2/src/rcoo88.c:197:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %lf",cdummy,&fazoo); data/z88-13.0.0+dfsg2/src/rcoo88.c:210:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %f %f %f %f %f %f %f %f %f %f %f %f", data/z88-13.0.0+dfsg2/src/rcoo88.c:227:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %f %f %f %f %f %f %f %f %f %f %f %f", data/z88-13.0.0+dfsg2/src/rcoo88.c:244:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %f %f %f %f %f %f %f %f %f %f %f %f", data/z88-13.0.0+dfsg2/src/rcoo88.c:270:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %f %f %f %f", data/z88-13.0.0+dfsg2/src/rcoo88.c:279:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %f %f %f %f", data/z88-13.0.0+dfsg2/src/rcoo88.c:288:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %f %f %f %f", data/z88-13.0.0+dfsg2/src/rcoo88.c:297:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %f %f %f %f", data/z88-13.0.0+dfsg2/src/rcoo88.c:315:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %f %f %f %f", data/z88-13.0.0+dfsg2/src/rcoo88.c:324:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %f %f %f %f", data/z88-13.0.0+dfsg2/src/rcoo88.c:333:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %f %f %f %f", data/z88-13.0.0+dfsg2/src/rcoo88.c:342:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %f %f %f %f", data/z88-13.0.0+dfsg2/src/rcoo88.c:360:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %f %f %f %f", data/z88-13.0.0+dfsg2/src/rcoo88.c:369:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %f %f %f %f", data/z88-13.0.0+dfsg2/src/rcoo88.c:387:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %f %f %f %f", data/z88-13.0.0+dfsg2/src/rcoo88.c:396:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %f %f %f %f", data/z88-13.0.0+dfsg2/src/rcoo88.c:405:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %f",cdummy,&f0); data/z88-13.0.0+dfsg2/src/rcoo88.c:419:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %f %f %f",cdummy,&f0,&f1,&f2); data/z88-13.0.0+dfsg2/src/rcoo88.c:426:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %f %f",cdummy,&f0,&f1); data/z88-13.0.0+dfsg2/src/rcoo88.c:432:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %f",cdummy,&f0); data/z88-13.0.0+dfsg2/src/rcoo88.c:446:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %f %f %f",cdummy,&f0,&f1,&f2); data/z88-13.0.0+dfsg2/src/rcoo88.c:453:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %f %f %f",cdummy,&f0,&f1,&f2); data/z88-13.0.0+dfsg2/src/rdy88h.c:109:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXGRA); data/z88-13.0.0+dfsg2/src/rdy88h.c:111:11: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",cdummy,&MAXNDL); data/z88-13.0.0+dfsg2/src/ri188.c:153:1: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDB PDE, data/z88-13.0.0+dfsg2/src/ri188.c:212:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PGB PGB PGE, data/z88-13.0.0+dfsg2/src/ri188.c:221:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PGB PGE, data/z88-13.0.0+dfsg2/src/ri188.c:250:3: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDE,&idummy,&ityp[i]); data/z88-13.0.0+dfsg2/src/ri188.c:273:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDE, data/z88-13.0.0+dfsg2/src/ri188.c:300:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDE, data/z88-13.0.0+dfsg2/src/ri188.c:323:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PDB PDB PDB PDE, data/z88-13.0.0+dfsg2/src/ri188.c:348:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PDE, data/z88-13.0.0+dfsg2/src/ri188.c:372:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB\ data/z88-13.0.0+dfsg2/src/ri188.c:405:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB PDE, data/z88-13.0.0+dfsg2/src/ri188.c:433:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDB PDB PDE, data/z88-13.0.0+dfsg2/src/ri188.c:460:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PDB PDE, data/z88-13.0.0+dfsg2/src/ri188.c:484:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB\ data/z88-13.0.0+dfsg2/src/ri188.c:511:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PGB PGB PDB PGE, data/z88-13.0.0+dfsg2/src/ri188.c:525:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PGB PGB PDB PGB PGE, data/z88-13.0.0+dfsg2/src/ri188.c:538:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PGB PGB PDB PGB PGB PGB PGB PGB PGB PGE, data/z88-13.0.0+dfsg2/src/ri188i.c:153:1: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDB PDE, data/z88-13.0.0+dfsg2/src/ri188i.c:212:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PGB PGB PGE, data/z88-13.0.0+dfsg2/src/ri188i.c:221:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PGB PGE, data/z88-13.0.0+dfsg2/src/ri188i.c:250:3: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDE,&idummy,&ityp[i]); data/z88-13.0.0+dfsg2/src/ri188i.c:273:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDE, data/z88-13.0.0+dfsg2/src/ri188i.c:300:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDE, data/z88-13.0.0+dfsg2/src/ri188i.c:323:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PDB PDB PDB PDE, data/z88-13.0.0+dfsg2/src/ri188i.c:348:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PDE, data/z88-13.0.0+dfsg2/src/ri188i.c:372:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB\ data/z88-13.0.0+dfsg2/src/ri188i.c:405:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB PDE, data/z88-13.0.0+dfsg2/src/ri188i.c:433:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDB PDB PDE, data/z88-13.0.0+dfsg2/src/ri188i.c:460:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PDB PDE, data/z88-13.0.0+dfsg2/src/ri188i.c:484:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB\ data/z88-13.0.0+dfsg2/src/ri188i.c:511:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PGB PGB PDB PGE, data/z88-13.0.0+dfsg2/src/ri188i.c:525:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PGB PGB PDB PGB PGE, data/z88-13.0.0+dfsg2/src/ri188i.c:538:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PGB PGB PDB PGB PGB PGB PGB PGB PGB PGE, data/z88-13.0.0+dfsg2/src/ri588.c:141:1: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD,&npr); data/z88-13.0.0+dfsg2/src/ri588.c:156:3: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD,&nep[i]); data/z88-13.0.0+dfsg2/src/ri588.c:172:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD BPG BPG BPD BPD BPD,&idummy,&pres[i],&tr1[i], data/z88-13.0.0+dfsg2/src/ri588.c:186:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD BPG BPD BPD BPD,&idummy,&pres[i], data/z88-13.0.0+dfsg2/src/ri588.c:200:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD BPG BPD BPD BPD BPD BPD BPD, data/z88-13.0.0+dfsg2/src/ri588.c:217:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD BPG BPG BPG BPD BPD BPD BPD BPD BPD BPD BPD, data/z88-13.0.0+dfsg2/src/ri588.c:235:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD BPG BPG BPG BPD BPD BPD BPD, data/z88-13.0.0+dfsg2/src/ri588.c:251:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD BPG BPG BPD BPD BPD BPD, data/z88-13.0.0+dfsg2/src/ri588.c:264:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD BPG,&idummy,&pres[i]); data/z88-13.0.0+dfsg2/src/ri588i.c:140:1: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD,&npr); data/z88-13.0.0+dfsg2/src/ri588i.c:155:3: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD,&nep[i]); data/z88-13.0.0+dfsg2/src/ri588i.c:171:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD BPG BPG BPD BPD BPD,&idummy,&pres[i],&tr1[i], data/z88-13.0.0+dfsg2/src/ri588i.c:185:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD BPG BPD BPD BPD,&idummy,&pres[i], data/z88-13.0.0+dfsg2/src/ri588i.c:199:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD BPG BPD BPD BPD BPD BPD BPD, data/z88-13.0.0+dfsg2/src/ri588i.c:216:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD BPG BPG BPG BPD BPD BPD BPD BPD BPD BPD BPD, data/z88-13.0.0+dfsg2/src/ri588i.c:234:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD BPG BPG BPG BPD BPD BPD BPD, data/z88-13.0.0+dfsg2/src/ri588i.c:250:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD BPG BPG BPD BPD BPD BPD, data/z88-13.0.0+dfsg2/src/ri588i.c:263:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD BPG,&idummy,&pres[i]); data/z88-13.0.0+dfsg2/src/wlog88d.c:107:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fwlo,"\nMAXKOI = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88d.c:112:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fwlo,"\nMAXK = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88d.c:117:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fwlo,"\nMAXE = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88d.c:122:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fwlo,"\nMAXNFG = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88d.c:127:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fwlo,"\nMAXNEG = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88e.c:111:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fwlo,"\nMAXKOI = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88e.c:116:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fwlo,"\nMAXK = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88e.c:121:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fwlo,"\nMAXE = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88e.c:126:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fwlo,"\nMAXNFG = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88e.c:131:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fwlo,"\nMAXNEG = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88e.c:136:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fwlo,"\nMAXESM = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88f.c:89:19: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 1) fprintf(fwlo,"\nSteuerflag CFLAG fuer Z88F ist -C, ICFLAG = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88f.c:90:19: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 2) fprintf(fwlo,"\nflag CFLAG for Z88F is -C, ICFLAG = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88f.c:95:19: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 1) fprintf(fwlo,"\nSteuerflag CFLAG fuer Z88F ist -T, ICFLAG = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88f.c:96:19: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 2) fprintf(fwlo,"\nflag CFLAG for Z88F is -T, ICFLAG = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88f.c:119:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fwlo,"\nMAXGS = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88f.c:124:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fwlo,"\nMAXKOI = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88f.c:129:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fwlo,"\nMAXK = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88f.c:134:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fwlo,"\nMAXE = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88f.c:139:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fwlo,"\nMAXNFG = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88f.c:144:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fwlo,"\nMAXNEG = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88f.c:149:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fwlo,"\nMAXESM = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88f.c:465:19: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 1) fprintf(fwlo,"\nEinarbeiten der Randbedingungen Pass " PD,i); data/z88-13.0.0+dfsg2/src/wlog88f.c:466:19: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 2) fprintf(fwlo,"\nincorporating constraints pass " PD,i); data/z88-13.0.0+dfsg2/src/wlog88i1.c:107:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fl1,"\nMAXKOI = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88i1.c:112:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fl1,"\nMAXIEZ = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88i1.c:117:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fl1,"\nMAXGS = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88i1.c:122:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fl1,"\nMAXK = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88i1.c:127:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fl1,"\nMAXE = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88i1.c:132:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fl1,"\nMAXNFG = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88i1.c:137:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fl1,"\nMAXNEG = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88i2.c:96:19: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 1) fprintf(fl2,"\nSteuerflag CFLAG fuer Z88I2 ist -C, ICFLAG = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88i2.c:97:19: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 2) fprintf(fl2,"\nflag CFLAG for Z88I2 is -C, ICFLAG = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88i2.c:102:19: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 1) fprintf(fl2,"\nSteuerflag CFLAG fuer Z88I2 ist -S, ICFLAG = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88i2.c:103:19: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 2) fprintf(fl2,"\nflag CFLAG for Z88I2 is -S, ICFLAG = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88i2.c:126:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fl2,"\nMAXKOI = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88i2.c:131:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fl2,"\nMAXGS = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88i2.c:136:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fl2,"\nMAXK = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88i2.c:141:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fl2,"\nMAXE = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88i2.c:146:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fl2,"\nMAXNFG = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88i2.c:151:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fl2,"\nMAXNEG = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88i2.c:156:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fl2,"\nMAXESM = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88i2.c:161:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fl2,"\nMAXPR = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88i2.c:388:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fl2,"\nMAXIT = " PD,i); data/z88-13.0.0+dfsg2/src/wlog88i2.c:393:19: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 1) fprintf(fl2,"\nEinarbeiten der Randbedingungen Pass " PD,i); data/z88-13.0.0+dfsg2/src/wlog88i2.c:394:19: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 2) fprintf(fl2,"\nincorporating constraints pass " PD,i); data/z88-13.0.0+dfsg2/src/wria88f.c:249:1: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0, data/z88-13.0.0+dfsg2/src/wria88f.c:261:1: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0, data/z88-13.0.0+dfsg2/src/wria88f.c:285:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLB PDB PD2B P13E P13E P13E,i,ifrei[i],x[i],y[i],z[i]); data/z88-13.0.0+dfsg2/src/wria88f.c:315:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB PDB PDB NLE, data/z88-13.0.0+dfsg2/src/wria88f.c:329:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLB PDB PDB NLB PDB PDB NLE,i,ityp[i], data/z88-13.0.0+dfsg2/src/wria88f.c:338:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB NLE, data/z88-13.0.0+dfsg2/src/wria88f.c:350:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB NLE, data/z88-13.0.0+dfsg2/src/wria88f.c:360:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB, data/z88-13.0.0+dfsg2/src/wria88f.c:368:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0, data/z88-13.0.0+dfsg2/src/wria88f.c:382:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB, data/z88-13.0.0+dfsg2/src/wria88f.c:388:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,PDB PDB PDB PDB PDB PDB NLE, data/z88-13.0.0+dfsg2/src/wria88f.c:399:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB NLE, data/z88-13.0.0+dfsg2/src/wria88f.c:413:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB NLE,i,ityp[i], data/z88-13.0.0+dfsg2/src/wria88f.c:423:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB, data/z88-13.0.0+dfsg2/src/wria88f.c:431:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,PDB PDB PDB PDB PDB PDB NLE, data/z88-13.0.0+dfsg2/src/wria88f.c:455:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLB PDB PDB B213E B213E B22D B513E, data/z88-13.0.0+dfsg2/src/wria88f.c:473:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLE PDB PDB P13EB P11EB P2DB P13EB\ data/z88-13.0.0+dfsg2/src/wria88i.c:246:1: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0, data/z88-13.0.0+dfsg2/src/wria88i.c:258:1: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0, data/z88-13.0.0+dfsg2/src/wria88i.c:282:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLB PDB PD2B P13E P13E P13E,i,ifrei[i],x[i],y[i],z[i]); data/z88-13.0.0+dfsg2/src/wria88i.c:313:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB PDB PDB NLE, data/z88-13.0.0+dfsg2/src/wria88i.c:327:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLB PDB PDB NLB PDB PDB NLE,i,ityp[i], data/z88-13.0.0+dfsg2/src/wria88i.c:336:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB NLE, data/z88-13.0.0+dfsg2/src/wria88i.c:348:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB NLE, data/z88-13.0.0+dfsg2/src/wria88i.c:358:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB, data/z88-13.0.0+dfsg2/src/wria88i.c:366:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0, data/z88-13.0.0+dfsg2/src/wria88i.c:380:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB, data/z88-13.0.0+dfsg2/src/wria88i.c:386:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,PDB PDB PDB PDB PDB PDB NLE, data/z88-13.0.0+dfsg2/src/wria88i.c:397:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB NLE, data/z88-13.0.0+dfsg2/src/wria88i.c:411:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB NLE,i,ityp[i], data/z88-13.0.0+dfsg2/src/wria88i.c:421:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLB PDB PDB NLB PDB PDB PDB PDB PDB PDB PDB PDB PDB PDB, data/z88-13.0.0+dfsg2/src/wria88i.c:429:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,PDB PDB PDB PDB PDB PDB NLE, data/z88-13.0.0+dfsg2/src/wria88i.c:453:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLB PDB PDB B213E B213E B22D B513E, data/z88-13.0.0+dfsg2/src/wria88i.c:471:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo0,NLE PDB PDB P13EB P11EB P2DB P13EB\ data/z88-13.0.0+dfsg2/src/wrim88e.c:102:15: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 1) printf("\rNr. " P5D " Typ " P5D,k,i); data/z88-13.0.0+dfsg2/src/wrim88e.c:103:15: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 2) printf("\rno. " P5D " type " P5D,k,i); data/z88-13.0.0+dfsg2/src/wrim88f.c:88:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf("\r" PD,i); data/z88-13.0.0+dfsg2/src/wrim88f.c:92:19: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 1) printf("\rElement " PD,i); data/z88-13.0.0+dfsg2/src/wrim88f.c:93:19: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 2) printf("\relement " PD,i); data/z88-13.0.0+dfsg2/src/wrim88f.c:97:19: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 1) printf(PD " x " PD " = Groesse Gleichungsystem \n",i,i); data/z88-13.0.0+dfsg2/src/wrim88f.c:98:19: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 2) printf(PD " x " PD " = size of system of equations\n",i,i); data/z88-13.0.0+dfsg2/src/wrim88f.c:255:15: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 1) printf("\rNr. " P5D " Typ " P5D,k,i); data/z88-13.0.0+dfsg2/src/wrim88f.c:256:15: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 2) printf("\rno. " P5D " type " P5D,k,i); data/z88-13.0.0+dfsg2/src/wrim88i.c:92:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf("\r" PD,i); data/z88-13.0.0+dfsg2/src/wrim88i.c:96:19: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 1) printf("\rElement " PD,i); data/z88-13.0.0+dfsg2/src/wrim88i.c:97:19: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 2) printf("\relement " PD,i); data/z88-13.0.0+dfsg2/src/wrim88i.c:101:19: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 1) printf(PD " x " PD " = Groesse Gleichungsystem \n",i,i); data/z88-13.0.0+dfsg2/src/wrim88i.c:102:19: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 2) printf(PD " x " PD " = size of system of equations\n",i,i); data/z88-13.0.0+dfsg2/src/wrim88i.c:275:19: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 1) printf("\rpartielle Cholesky- Zerlegung Nr." PD,i); data/z88-13.0.0+dfsg2/src/wrim88i.c:276:19: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 2) printf("\rincomplete Cholesky decomposition no." PD,i); data/z88-13.0.0+dfsg2/src/wrim88i.c:389:15: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 1) printf("\rnoch " PD9 " Schritte, Pointer IEZ = " PD9,k,i); data/z88-13.0.0+dfsg2/src/wrim88i.c:390:15: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 2) printf("\rstill " PD9 " steps, pointer IEZ = " PD9,k,i); data/z88-13.0.0+dfsg2/src/wrim88i.c:402:15: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 1) printf("\rRandbedingung Nr. " PD " Typ " PD,k,i); data/z88-13.0.0+dfsg2/src/wrim88i.c:403:15: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 2) printf("\rconstraint no. " PD " type " PD,k,i); data/z88-13.0.0+dfsg2/src/z88cc.c:192:1: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD,&nrb); data/z88-13.0.0+dfsg2/src/z88cc.c:198:3: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PDB PG,&nkn,&ifg,&iflag1,&wert); data/z88-13.0.0+dfsg2/src/z88cc.c:286:1: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD,&nrb); data/z88-13.0.0+dfsg2/src/z88cc.c:305:3: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PDB PG,&nkn,&ifg,&iflag1,&wert); data/z88-13.0.0+dfsg2/src/z88cc.c:313:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo1, "Knoten#" B5D " FG" B1D " Steuerflag" B1D " Last " P15E NL, data/z88-13.0.0+dfsg2/src/z88cc.c:317:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo1, " node#" B5D " DOF" B1D " lo/di flag" B1D " load " P15E NL, data/z88-13.0.0+dfsg2/src/z88cc.c:324:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo1, "Knoten#" B5D " FG" B1D " Steuerflag" B1D " Verschiebung " P15E NL, data/z88-13.0.0+dfsg2/src/z88cc.c:328:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo1," node#" B5D " DOF" B1D " lo/di flag" B1D " displacement " P15E NL, data/z88-13.0.0+dfsg2/src/z88cc.c:415:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo2,NL B5D B315E B315E,i,rs[k],rs[k+1]); data/z88-13.0.0+dfsg2/src/z88cc.c:424:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo2,NL B5D B315E B315E B315E,i,rs[k],rs[k+1],rs[k+2]); data/z88-13.0.0+dfsg2/src/z88cc.c:433:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo2,NL B5D B315E B315E B315E B315E B315E B315E, data/z88-13.0.0+dfsg2/src/z88ci.c:205:1: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PF PF PF,&maxit,&eps,&rpalpha,&rpomega); data/z88-13.0.0+dfsg2/src/z88ci.c:219:1: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD,&nrb); data/z88-13.0.0+dfsg2/src/z88ci.c:225:3: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PDB PG,&nkn,&ifg,&iflag1,&wert); data/z88-13.0.0+dfsg2/src/z88ci.c:317:1: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PD,&nrb); data/z88-13.0.0+dfsg2/src/z88ci.c:336:3: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PDB PG,&nkn,&ifg,&iflag1,&wert); data/z88-13.0.0+dfsg2/src/z88ci.c:344:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo1, "Knoten#" B5D " FG" B1D " Steuerflag" B1D " Last " P15E NL, data/z88-13.0.0+dfsg2/src/z88ci.c:348:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo1, " node#" B5D " DOF" B1D " lo/di flag" B1D " load " P15E NL, data/z88-13.0.0+dfsg2/src/z88ci.c:355:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo1, "Knoten#" B5D " FG" B1D " Steuerflag" B1D " Verschiebung " P15E NL, data/z88-13.0.0+dfsg2/src/z88ci.c:359:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo1," node#" B5D " DOF" B1D " lo/di flag" B1D " displacement " P15E NL, data/z88-13.0.0+dfsg2/src/z88ci.c:461:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo2,NL B5D B315E B315E,i,rs[k],rs[k+1]); data/z88-13.0.0+dfsg2/src/z88ci.c:470:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo2,NL B5D B315E B315E B315E,i,rs[k],rs[k+1],rs[k+2]); data/z88-13.0.0+dfsg2/src/z88ci.c:479:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo2,NL B5D B315E B315E B315E B315E B315E B315E, data/z88-13.0.0+dfsg2/src/z88d.c:292:1: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. sscanf(cline,PDB PDB PD,&ninto,&kflag,&isflag); data/z88-13.0.0+dfsg2/src/z88d.c:312:1: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo5,BP5D BP5D BP5D,ndim,ninto,isflag); data/z88-13.0.0+dfsg2/src/z88d.c:505:15: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 1) fprintf(fo3,"\n\nElement #= " P5D " Typ =RBalken\ data/z88-13.0.0+dfsg2/src/z88d.c:507:15: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 2) fprintf(fo3,"\n\nelement #= " P5D " type =spbeam\ data/z88-13.0.0+dfsg2/src/z88d.c:650:15: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 1) fprintf(fo3,"\n\nElement #= " P5D " Typ = Welle\ data/z88-13.0.0+dfsg2/src/z88d.c:652:15: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 2) fprintf(fo3,"\n\nelement #= " P5D " type = shaft\ data/z88-13.0.0+dfsg2/src/z88d.c:1067:20: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 1) fprintf(fo3,"\n\nElement #= " P5D " Typ= Balken in Ebene\ data/z88-13.0.0+dfsg2/src/z88d.c:1070:20: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. if(LANG == 2) fprintf(fo3,"\n\nelement #= " P5D " type = beam in plane\ data/z88-13.0.0+dfsg2/src/z88d.c:1535:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo8," " PDB PD,janz,isflag); data/z88-13.0.0+dfsg2/src/z88d.c:1545:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo8,NL P7DB P7DB P11E,k,jsm[k],smw[k]); data/z88-13.0.0+dfsg2/src/z88d.c:1552:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo8,NL " " PD,ne); data/z88-13.0.0+dfsg2/src/z88d.c:1558:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo8,NL P7DB P11E,k,gmw[k]); data/z88-13.0.0+dfsg2/src/z88e.c:409:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo4,NL P5DB B213E B213E B213E, data/z88-13.0.0+dfsg2/src/z88e.c:476:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo4,NL P5DB B213E B213E B213E B213E B213E B213E, data/z88-13.0.0+dfsg2/src/z88e.c:552:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo4,NL P5DB B213E B213E, data/z88-13.0.0+dfsg2/src/z88e.c:616:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo4,NL P5DB B213E B213E B213E, data/z88-13.0.0+dfsg2/src/z88e.c:679:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo4,NL P5DB B213E B213E B213E B213E B213E B213E, data/z88-13.0.0+dfsg2/src/z88e.c:748:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo4,NL P5DB B213E B213E, data/z88-13.0.0+dfsg2/src/z88e.c:843:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo4,NL P5DB B213E B213E, data/z88-13.0.0+dfsg2/src/z88e.c:905:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo4,NL P5DB B213E B213E, data/z88-13.0.0+dfsg2/src/z88e.c:976:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo4,NL P5DB B213E B213E B213E, data/z88-13.0.0+dfsg2/src/z88e.c:1072:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo4,NL P5DB B213E B213E, data/z88-13.0.0+dfsg2/src/z88e.c:1134:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo4,NL P5DB B213E B213E B213E, data/z88-13.0.0+dfsg2/src/z88e.c:1230:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo4,NL P5DB B213E B213E, data/z88-13.0.0+dfsg2/src/z88e.c:1301:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo4,NL P5DB B213E B213E B213E, data/z88-13.0.0+dfsg2/src/z88e.c:1373:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo4,NL P5DB B213E B213E B213E, data/z88-13.0.0+dfsg2/src/z88e.c:1444:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo4,NL P5DB B213E B213E B213E, data/z88-13.0.0+dfsg2/src/z88e.c:1515:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo4,NL P5DB B213E B213E B213E, data/z88-13.0.0+dfsg2/src/z88e.c:1586:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo4,NL P5DB B213E B213E B213E, data/z88-13.0.0+dfsg2/src/z88e.c:1633:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fo4,P5DB B213E B213E B213E B213E B213E B213E NL, data/z88-13.0.0+dfsg2/src/z88f.c:207:1: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cflagul,argv[1]); data/z88-13.0.0+dfsg2/src/z88fx.c:227:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld %ld %ld %ld %ld %ld %ld %ld %ld", data/z88-13.0.0+dfsg2/src/z88fx.c:238:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld %ld %ld %ld %ld %ld %ld %ld %ld %ld", data/z88-13.0.0+dfsg2/src/z88fx.c:384:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",ctext,&k); /* k lesen */ data/z88-13.0.0+dfsg2/src/z88fx.c:439:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",ctext,&k); data/z88-13.0.0+dfsg2/src/z88fx.c:440:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld %ld",ctext,&idummy,&ityp[k]); data/z88-13.0.0+dfsg2/src/z88fx.c:451:9: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld %ld %ld %ld %c %ld %c %ld %c", data/z88-13.0.0+dfsg2/src/z88fx.c:460:9: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld %ld %ld %ld %c %ld %c", data/z88-13.0.0+dfsg2/src/z88fx.c:591:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",ctext,&j); data/z88-13.0.0+dfsg2/src/z88fx.c:594:7: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld %ld %ld %lg %lg %ld %lg",ctext,&idummy, data/z88-13.0.0+dfsg2/src/z88fx.c:603:7: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline, data/z88-13.0.0+dfsg2/src/z88fx.c:648:7: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",ctext,&nrb); data/z88-13.0.0+dfsg2/src/z88fx.c:682:7: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",ctext,&j); data/z88-13.0.0+dfsg2/src/z88fx.c:683:7: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld %ld %ld %ld %lg", data/z88-13.0.0+dfsg2/src/z88fx.c:723:7: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",ctext,&npr); data/z88-13.0.0+dfsg2/src/z88fx.c:757:7: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld",ctext,&j); data/z88-13.0.0+dfsg2/src/z88fx.c:758:7: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld %ld",ctext,&idummy,&nep[j]); data/z88-13.0.0+dfsg2/src/z88fx.c:776:9: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld %ld %lf %lf %ld %ld %ld", data/z88-13.0.0+dfsg2/src/z88fx.c:804:9: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld %ld %lf %lf %lf %ld %ld %ld %ld %ld %ld %ld %ld", data/z88-13.0.0+dfsg2/src/z88fx.c:838:9: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld %ld %lf %lf %lf %ld %ld %ld %ld", data/z88-13.0.0+dfsg2/src/z88fx.c:868:9: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld %ld %lf %lf %ld %ld %ld %ld", data/z88-13.0.0+dfsg2/src/z88fx.c:888:9: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld %ld %lf",ctext,&idummy,&jdummy,&pres[j]); data/z88-13.0.0+dfsg2/src/z88fx.c:926:7: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. sscanf(cline,"%s %ld %ld %ld",ctext,&ninto,&ksflag,&isflag); data/z88-13.0.0+dfsg2/src/z88i2.c:216:1: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cflagul,argv[1]); data/z88-13.0.0+dfsg2/src/z88o.c:393:1: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(CF_GRAFICS,CPANGO_FONT); data/z88-13.0.0+dfsg2/src/z88o.c:395:1: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(CF_GRAFICS,CPANGO_SIZE); data/z88-13.0.0+dfsg2/src/z88x.c:197:1: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cflagul,argv[1]); data/z88-13.0.0+dfsg2/src/z88x.c:229:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cftexts,argv[2]); data/z88-13.0.0+dfsg2/src/ale88c.c:61:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmess[256]; data/z88-13.0.0+dfsg2/src/ale88c.c:66:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Browser nicht starten!\nEinstellungen in Z88.FCD pruefen."); data/z88-13.0.0+dfsg2/src/ale88c.c:67:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot launch Browser!\nCheck your entries in Z88.FCD."); data/z88-13.0.0+dfsg2/src/ale88c.c:71:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88COM.LOG nicht oeffnen!"); data/z88-13.0.0+dfsg2/src/ale88c.c:72:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot open Z88COM.LOG!"); data/z88-13.0.0+dfsg2/src/ale88c.c:76:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88.DYN oder Editor nicht oeffnen!\nZ88.FCD pruefen."); data/z88-13.0.0+dfsg2/src/ale88c.c:77:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot open Z88.DYN or Editor!\nCheck Z88.FCD"); data/z88-13.0.0+dfsg2/src/ale88c.c:81:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88.FCD oder Editor nicht oeffnen!\nZ88.FCD pruefen."); data/z88-13.0.0+dfsg2/src/ale88c.c:82:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot open Z88.FCD or Editor!\nCheck Z88.FCD"); data/z88-13.0.0+dfsg2/src/ale88c.c:86:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Z88.DYN ist falsch!"); data/z88-13.0.0+dfsg2/src/ale88c.c:87:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Z88.DYN is wrong!"); data/z88-13.0.0+dfsg2/src/ale88c.c:91:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88NI.TXT oder Editor nicht oeffnen!\nZ88.FCD pruefen."); data/z88-13.0.0+dfsg2/src/ale88c.c:92:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot open Z88NI.TXT or Editor!\nCheck Z88.FCD"); data/z88-13.0.0+dfsg2/src/ale88c.c:96:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88I1.TXT oder Editor nicht oeffnen!\nZ88.FCD pruefen."); data/z88-13.0.0+dfsg2/src/ale88c.c:97:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot open Z88I1.TXT or Editor!\nCheck Z88.FCD"); data/z88-13.0.0+dfsg2/src/ale88c.c:101:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88I2.TXT oder Editor nicht oeffnen!\nZ88.FCD pruefen."); data/z88-13.0.0+dfsg2/src/ale88c.c:102:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot open Z88I2.TXT or Editor!\nCheck Z88.FCD"); data/z88-13.0.0+dfsg2/src/ale88c.c:106:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88I3.TXT oder Editor nicht oeffnen!\nZ88.FCD pruefen."); data/z88-13.0.0+dfsg2/src/ale88c.c:107:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot open Z88I3.TXT or Editor!\nCheck Z88.FCD"); data/z88-13.0.0+dfsg2/src/ale88c.c:111:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88I4.TXT oder Editor nicht oeffnen!\nZ88.FCD pruefen."); data/z88-13.0.0+dfsg2/src/ale88c.c:112:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot open Z88I4.TXT or Editor!\nCheck Z88.FCD"); data/z88-13.0.0+dfsg2/src/ale88c.c:116:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88I5.TXT oder Editor nicht oeffnen!\nZ88.FCD pruefen."); data/z88-13.0.0+dfsg2/src/ale88c.c:117:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot open Z88I5.TXT or Editor!\nCheck Z88.FCD"); data/z88-13.0.0+dfsg2/src/ale88c.c:121:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88O0.TXT oder Editor nicht oeffnen!\nZ88.FCD pruefen."); data/z88-13.0.0+dfsg2/src/ale88c.c:122:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot open Z88O0.TXT or Editor!\nCheck Z88.FCD"); data/z88-13.0.0+dfsg2/src/ale88c.c:126:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88O1.TXT oder Editor nicht oeffnen!\nZ88.FCD pruefen."); data/z88-13.0.0+dfsg2/src/ale88c.c:127:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot open Z88O1.TXT or Editor!\nCheck Z88.FCD"); data/z88-13.0.0+dfsg2/src/ale88c.c:131:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88O2.TXT oder Editor nicht oeffnen!\nZ88.FCD pruefen."); data/z88-13.0.0+dfsg2/src/ale88c.c:132:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot open Z88O2.TXT or Editor!\nCheck Z88.FCD"); data/z88-13.0.0+dfsg2/src/ale88c.c:136:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88O3.TXT oder Editor nicht oeffnen!\nZ88.FCD pruefen."); data/z88-13.0.0+dfsg2/src/ale88c.c:137:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot open Z88O3.TXT or Editor!\nCheck Z88.FCD"); data/z88-13.0.0+dfsg2/src/ale88c.c:141:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88O4.TXT oder Editor nicht oeffnen!\nZ88.FCD pruefen."); data/z88-13.0.0+dfsg2/src/ale88c.c:142:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot open Z88O4.TXT or Editor!\nCheck Z88.FCD"); data/z88-13.0.0+dfsg2/src/ale88c.c:146:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88F nicht starten!"); data/z88-13.0.0+dfsg2/src/ale88c.c:147:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot launch Z88F!"); data/z88-13.0.0+dfsg2/src/ale88c.c:151:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88E nicht starten!"); data/z88-13.0.0+dfsg2/src/ale88c.c:152:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot launch Z88E!"); data/z88-13.0.0+dfsg2/src/ale88c.c:156:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88D nicht starten!"); data/z88-13.0.0+dfsg2/src/ale88c.c:157:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot launch Z88D!"); data/z88-13.0.0+dfsg2/src/ale88c.c:161:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88I1 nicht starten!"); data/z88-13.0.0+dfsg2/src/ale88c.c:162:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot launch Z88I1!"); data/z88-13.0.0+dfsg2/src/ale88c.c:166:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88I2 nicht starten!"); data/z88-13.0.0+dfsg2/src/ale88c.c:167:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot launch Z88I2!"); data/z88-13.0.0+dfsg2/src/ale88c.c:171:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88PAR nicht starten!"); data/z88-13.0.0+dfsg2/src/ale88c.c:172:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot launch Z88PAR!"); data/z88-13.0.0+dfsg2/src/ale88c.c:176:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88X nicht starten!"); data/z88-13.0.0+dfsg2/src/ale88c.c:177:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot launch Z88X!"); data/z88-13.0.0+dfsg2/src/ale88c.c:181:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88G nicht starten!"); data/z88-13.0.0+dfsg2/src/ale88c.c:182:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot launch Z88G!"); data/z88-13.0.0+dfsg2/src/ale88c.c:186:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88H nicht starten!"); data/z88-13.0.0+dfsg2/src/ale88c.c:187:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot launch Z88H!"); data/z88-13.0.0+dfsg2/src/ale88c.c:191:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88V nicht starten!"); data/z88-13.0.0+dfsg2/src/ale88c.c:192:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot launch Z88V!"); data/z88-13.0.0+dfsg2/src/ale88c.c:196:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88O nicht starten!"); data/z88-13.0.0+dfsg2/src/ale88c.c:197:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot launch Z88O!"); data/z88-13.0.0+dfsg2/src/ale88o.c:64:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmess[256]; data/z88-13.0.0+dfsg2/src/ale88o.c:66:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Unbekannten Fehler endeckt!"); data/z88-13.0.0+dfsg2/src/ale88o.c:67:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Unknown Error detected!"); data/z88-13.0.0+dfsg2/src/ale88o.c:72:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Browser nicht starten!\nEinstellungen in Z88.FCD pruefen."); data/z88-13.0.0+dfsg2/src/ale88o.c:73:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot launch Browser!\nCheck your entries in Z88.FCD."); data/z88-13.0.0+dfsg2/src/ale88o.c:78:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88O.LOG nicht oeffnen!"); data/z88-13.0.0+dfsg2/src/ale88o.c:79:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot open Z88O.LOG!"); data/z88-13.0.0+dfsg2/src/ale88o.c:84:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Z88.DYN nicht oeffnen!"); data/z88-13.0.0+dfsg2/src/ale88o.c:85:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot open Z88.DYN!"); data/z88-13.0.0+dfsg2/src/ale88o.c:90:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Z88.DYN ist falsch!"); data/z88-13.0.0+dfsg2/src/ale88o.c:91:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Z88.DYN is wrong!"); data/z88-13.0.0+dfsg2/src/ale88o.c:96:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Nicht genug dynamischer Speicher!\n\ data/z88-13.0.0+dfsg2/src/ale88o.c:98:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Dynamic memory exhausted!\n\ data/z88-13.0.0+dfsg2/src/ale88o.c:104:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Strukturfile nicht gefunden!\n\ data/z88-13.0.0+dfsg2/src/ale88o.c:106:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Structure file not found!\n\ data/z88-13.0.0+dfsg2/src/ale88o.c:112:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Z88I2.TXT nicht gefunden!\n\ data/z88-13.0.0+dfsg2/src/ale88o.c:114:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Z88I2.TXT not found!\n\ data/z88-13.0.0+dfsg2/src/ale88o.c:120:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Z88I5.TXT nicht gefunden!\n\ data/z88-13.0.0+dfsg2/src/ale88o.c:122:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Z88I5.TXT not found!\n\ data/z88-13.0.0+dfsg2/src/ale88o.c:128:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Z88O2.TXT nicht gefunden!\n\ data/z88-13.0.0+dfsg2/src/ale88o.c:131:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Z88O2.TXT not found!\n\ data/z88-13.0.0+dfsg2/src/ale88o.c:140:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Z88O5.TXT nicht gefunden!\n\ data/z88-13.0.0+dfsg2/src/ale88o.c:143:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Z88O5.TXT not found !\n\ data/z88-13.0.0+dfsg2/src/ale88o.c:151:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Z88O8.TXT nicht gefunden!\n\ data/z88-13.0.0+dfsg2/src/ale88o.c:154:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Z88O8.TXT not found !\n\ data/z88-13.0.0+dfsg2/src/ale88o.c:162:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Integrationsordnung 0! Abhilfe: NINT > 0 in Z88I3.TXT, Z88D starten"); data/z88-13.0.0+dfsg2/src/ale88o.c:163:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"integration order 0! Recover: NINT > 0 in Z88I3.TXT, run Z88D again"); data/z88-13.0.0+dfsg2/src/ale88o.c:169:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Integrationsordnung ist nicht Null! Neuer Lauf Z88D mit NINT=0 in Z88I3.TXT."); data/z88-13.0.0+dfsg2/src/ale88o.c:170:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Integration constant is not Zero! Run Z88D again, enter NINT=0 in Z88I3.TXT ."); data/z88-13.0.0+dfsg2/src/ale88o.c:176:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Speicher fuer Knoten ueberschritten ! STOP !\n\ data/z88-13.0.0+dfsg2/src/ale88o.c:178:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Memory for nodes exhausted ! STOP !\n\ data/z88-13.0.0+dfsg2/src/ale88o.c:184:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Speicher fuer Koinzidenzvektor ueberschritten ! STOP !\n\ data/z88-13.0.0+dfsg2/src/ale88o.c:186:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Memory for coincidence vector exhausted ! STOP\n\ data/z88-13.0.0+dfsg2/src/ale88o.c:192:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Speicher fuer Elemente ueberschritten !\n\ data/z88-13.0.0+dfsg2/src/ale88o.c:194:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Memory for elements exhausted ! STOP !\n\ data/z88-13.0.0+dfsg2/src/ale88o.c:200:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"zuviele Gausspunkte! STOP ! Abhilfe: MAXGP in Z88.DYN erhoehen"); data/z88-13.0.0+dfsg2/src/ale88o.c:201:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"too many Gauss points! STOP ! Recover: increase MAXGP in Z88.DYN"); data/z88-13.0.0+dfsg2/src/ale88o.c:206:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Speicher fuer Drucklasten ueberschritten! STOP ! Abhilfe: MAXPR in Z88.DYN erhoehen."); data/z88-13.0.0+dfsg2/src/ale88o.c:207:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Memory for pressure loads exhausted! STOP ! Recover: increase MAXPR in Z88.DYN."); data/z88-13.0.0+dfsg2/src/ale88o.c:212:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Speicher fuer Randbedingungen ueberschritten! STOP ! Abhilfe: MAXRBD in Z88.DYN erhoehen."); data/z88-13.0.0+dfsg2/src/ale88o.c:213:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Memory for boundary conditions exhausted! STOP ! Recover: increase MAXRBD in Z88.DYN ."); data/z88-13.0.0+dfsg2/src/ale88o.c:218:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Falsche Dimension im Structurfile ! STOP !\n\ data/z88-13.0.0+dfsg2/src/ale88o.c:220:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Wrong dimension in structur file ! STOP !\n\ data/z88-13.0.0+dfsg2/src/ale88o.c:226:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann GLX-Grafikkontext nicht oeffnen ! STOP !"); data/z88-13.0.0+dfsg2/src/ale88o.c:227:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot open GLX Grafics Context ! STOP !"); data/z88-13.0.0+dfsg2/src/ale88o.c:232:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Kann Pango-Font nicht oeffnen ! STOP !"); data/z88-13.0.0+dfsg2/src/ale88o.c:233:19: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Cannot open Pango Font! STOP !"); data/z88-13.0.0+dfsg2/src/cb88c.c:72:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:77:15: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88ix.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:78:15: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88ix.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:94:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmess[512],cbytes[128]; data/z88-13.0.0+dfsg2/src/cb88c.c:96:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess, data/z88-13.0.0+dfsg2/src/cb88c.c:99:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess, data/z88-13.0.0+dfsg2/src/cb88c.c:104:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cbytes,"Floats: %d Bytes\n",(int)sizeof(long double)); data/z88-13.0.0+dfsg2/src/cb88c.c:108:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cbytes,"Floats: %d Bytes\n",(int)sizeof(double)); data/z88-13.0.0+dfsg2/src/cb88c.c:112:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cbytes,"Integers: %d Bytes\n",(int)sizeof(int)); data/z88-13.0.0+dfsg2/src/cb88c.c:116:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cbytes,"Integers: %d Bytes\n",(int)sizeof(long)); data/z88-13.0.0+dfsg2/src/cb88c.c:120:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cbytes,"Integers: %d Bytes\n",(int)sizeof(long long)); data/z88-13.0.0+dfsg2/src/cb88c.c:123:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cbytes,"Pointers: %d Bytes\n",(int)sizeof(pp)); data/z88-13.0.0+dfsg2/src/cb88c.c:173:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:185:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88v.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:186:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88v.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:201:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:213:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88n.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:214:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88n.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:229:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:241:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88d.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:242:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88d.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:257:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:269:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88e.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:270:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88e.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:285:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:297:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88g.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:298:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88g.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:313:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:325:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88h.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:326:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88h.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:341:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:353:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88o.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:354:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88o.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:369:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:374:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(command," z88.dyn"); data/z88-13.0.0+dfsg2/src/cb88c.c:383:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88dy.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:384:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88dy.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:399:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:404:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(command," z88.fcd"); data/z88-13.0.0+dfsg2/src/cb88c.c:423:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88mr.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:424:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88mr.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:439:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:444:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(command," z88ni.txt"); data/z88-13.0.0+dfsg2/src/cb88c.c:453:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88ni.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:454:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88ni.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:469:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:474:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(command," z88i1.txt"); data/z88-13.0.0+dfsg2/src/cb88c.c:483:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88i1.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:484:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88i1.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:499:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:504:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(command," z88i2.txt"); data/z88-13.0.0+dfsg2/src/cb88c.c:513:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88i2.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:514:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88i2.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:529:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:534:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(command," z88i3.txt"); data/z88-13.0.0+dfsg2/src/cb88c.c:543:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88i3.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:544:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88i3.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:559:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:564:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(command," z88i4.txt"); data/z88-13.0.0+dfsg2/src/cb88c.c:573:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88i4.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:574:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88i4.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:589:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:594:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(command," z88i5.txt"); data/z88-13.0.0+dfsg2/src/cb88c.c:603:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88i5.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:604:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88i5.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:619:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:624:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(command," z88o0.txt"); data/z88-13.0.0+dfsg2/src/cb88c.c:633:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88ix.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:634:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88ix.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:649:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:654:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(command," z88o1.txt"); data/z88-13.0.0+dfsg2/src/cb88c.c:663:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88ix.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:664:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88ix.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:679:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:684:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(command," z88o2.txt"); data/z88-13.0.0+dfsg2/src/cb88c.c:693:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88ix.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:694:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88ix.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:709:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:714:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(command," z88o3.txt"); data/z88-13.0.0+dfsg2/src/cb88c.c:723:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88ix.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:724:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88ix.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:739:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:744:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(command," z88o4.txt"); data/z88-13.0.0+dfsg2/src/cb88c.c:753:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88ix.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:754:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88ix.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:769:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:781:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88x.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:782:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88x.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:797:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:809:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88x.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:810:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88x.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:825:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:837:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88x.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:838:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88x.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:853:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:865:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88x.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:866:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88x.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:881:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:893:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88x.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:894:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88x.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:909:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:921:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88x.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:922:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88x.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:937:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:949:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88f.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:950:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88f.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:965:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:977:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88f.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:978:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88f.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:993:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:1005:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88ite.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:1006:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88ite.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:1021:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:1033:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88ite.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:1034:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88ite.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:1049:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:1061:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88ite.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:1062:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88ite.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:1077:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88c.c:1089:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88ite.htm"); data/z88-13.0.0+dfsg2/src/cb88c.c:1090:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88ite.htm"); data/z88-13.0.0+dfsg2/src/cb88o.c:350:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cmess,"Z88O V13.0 fuer UNIX/LINUX\n\ data/z88-13.0.0+dfsg2/src/cb88o.c:353:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cmess,"Z88O V13.0 for UNIX/LINUX\n\ data/z88-13.0.0+dfsg2/src/cb88o.c:358:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cbytes,"Floats: %d Bytes\n",(int)sizeof(long double)); data/z88-13.0.0+dfsg2/src/cb88o.c:362:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cbytes,"Floats: %d Bytes\n",(int)sizeof(double)); data/z88-13.0.0+dfsg2/src/cb88o.c:366:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cbytes,"Integers: %d Bytes\n",(int)sizeof(int)); data/z88-13.0.0+dfsg2/src/cb88o.c:370:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cbytes,"Integers: %d Bytes\n",(int)sizeof(long)); data/z88-13.0.0+dfsg2/src/cb88o.c:374:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cbytes,"Integers: %d Bytes\n",(int)sizeof(long long)); data/z88-13.0.0+dfsg2/src/cb88o.c:377:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cbytes,"Pointers: %d Bytes\n",(int)sizeof(pp)); data/z88-13.0.0+dfsg2/src/cb88o.c:395:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[320]; data/z88-13.0.0+dfsg2/src/cb88o.c:400:15: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcat(command,"g88o.htm"); data/z88-13.0.0+dfsg2/src/cb88o.c:401:15: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcat(command,"e88o.htm"); data/z88-13.0.0+dfsg2/src/cb88o.c:430:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fi1= fopen(cstrn,"r"); data/z88-13.0.0+dfsg2/src/cb88o.c:514:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[80]; data/z88-13.0.0+dfsg2/src/cb88o.c:519:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"* Maus / Tastatur"); data/z88-13.0.0+dfsg2/src/cb88o.c:520:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"* Mouse / Keyboard"); data/z88-13.0.0+dfsg2/src/cb88o.c:526:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"* Tastatur / Maus"); data/z88-13.0.0+dfsg2/src/cb88o.c:527:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"* Keyboard / Mouse"); data/z88-13.0.0+dfsg2/src/cb88o.c:540:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[80]; data/z88-13.0.0+dfsg2/src/cb88o.c:544:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"* unverformt"); data/z88-13.0.0+dfsg2/src/cb88o.c:545:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"* undeflected"); data/z88-13.0.0+dfsg2/src/cb88o.c:547:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"verformt"); data/z88-13.0.0+dfsg2/src/cb88o.c:548:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"deflected"); data/z88-13.0.0+dfsg2/src/cb88o.c:562:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[80]; data/z88-13.0.0+dfsg2/src/cb88o.c:566:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"unverformt"); data/z88-13.0.0+dfsg2/src/cb88o.c:567:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"undeflected"); data/z88-13.0.0+dfsg2/src/cb88o.c:569:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"* verformt"); data/z88-13.0.0+dfsg2/src/cb88o.c:570:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"* deflected"); data/z88-13.0.0+dfsg2/src/cb88o.c:585:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[80]; data/z88-13.0.0+dfsg2/src/cb88o.c:589:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"* Licht"); data/z88-13.0.0+dfsg2/src/cb88o.c:590:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"* Light"); data/z88-13.0.0+dfsg2/src/cb88o.c:592:1: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cstring,"Hidden Line"); data/z88-13.0.0+dfsg2/src/cb88o.c:594:1: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cstring,"Wireframe"); data/z88-13.0.0+dfsg2/src/cb88o.c:596:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen Eckknoten"); data/z88-13.0.0+dfsg2/src/cb88o.c:597:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses Corner Nodes"); data/z88-13.0.0+dfsg2/src/cb88o.c:599:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen pro Element"); data/z88-13.0.0+dfsg2/src/cb88o.c:600:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses per Element"); data/z88-13.0.0+dfsg2/src/cb88o.c:602:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen Gausspunkte"); data/z88-13.0.0+dfsg2/src/cb88o.c:603:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses Gauss Points"); data/z88-13.0.0+dfsg2/src/cb88o.c:605:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen X"); data/z88-13.0.0+dfsg2/src/cb88o.c:606:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections X"); data/z88-13.0.0+dfsg2/src/cb88o.c:608:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen Y"); data/z88-13.0.0+dfsg2/src/cb88o.c:609:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections Y"); data/z88-13.0.0+dfsg2/src/cb88o.c:611:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen Z"); data/z88-13.0.0+dfsg2/src/cb88o.c:612:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections Z"); data/z88-13.0.0+dfsg2/src/cb88o.c:627:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[80]; data/z88-13.0.0+dfsg2/src/cb88o.c:631:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Licht"); data/z88-13.0.0+dfsg2/src/cb88o.c:632:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Light"); data/z88-13.0.0+dfsg2/src/cb88o.c:634:1: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cstring,"* Hidden Line"); data/z88-13.0.0+dfsg2/src/cb88o.c:636:1: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cstring,"Wireframe"); data/z88-13.0.0+dfsg2/src/cb88o.c:638:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen Eckknoten"); data/z88-13.0.0+dfsg2/src/cb88o.c:639:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses Corner Nodes"); data/z88-13.0.0+dfsg2/src/cb88o.c:641:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen pro Element"); data/z88-13.0.0+dfsg2/src/cb88o.c:642:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses per Element"); data/z88-13.0.0+dfsg2/src/cb88o.c:644:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen Gausspunkte"); data/z88-13.0.0+dfsg2/src/cb88o.c:645:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses Gauss Points"); data/z88-13.0.0+dfsg2/src/cb88o.c:647:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen X"); data/z88-13.0.0+dfsg2/src/cb88o.c:648:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections X"); data/z88-13.0.0+dfsg2/src/cb88o.c:650:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen Y"); data/z88-13.0.0+dfsg2/src/cb88o.c:651:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections Y"); data/z88-13.0.0+dfsg2/src/cb88o.c:653:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen Z"); data/z88-13.0.0+dfsg2/src/cb88o.c:654:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections Z"); data/z88-13.0.0+dfsg2/src/cb88o.c:669:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[80]; data/z88-13.0.0+dfsg2/src/cb88o.c:673:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Licht"); data/z88-13.0.0+dfsg2/src/cb88o.c:674:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Light"); data/z88-13.0.0+dfsg2/src/cb88o.c:676:1: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cstring,"Hidden Line"); data/z88-13.0.0+dfsg2/src/cb88o.c:678:1: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cstring,"* Wireframe"); data/z88-13.0.0+dfsg2/src/cb88o.c:680:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen Eckknoten"); data/z88-13.0.0+dfsg2/src/cb88o.c:681:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses Corner Nodes"); data/z88-13.0.0+dfsg2/src/cb88o.c:683:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen pro Element"); data/z88-13.0.0+dfsg2/src/cb88o.c:684:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses per Element"); data/z88-13.0.0+dfsg2/src/cb88o.c:686:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen Gausspunkte"); data/z88-13.0.0+dfsg2/src/cb88o.c:687:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses Gauss Points"); data/z88-13.0.0+dfsg2/src/cb88o.c:689:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen X"); data/z88-13.0.0+dfsg2/src/cb88o.c:690:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections X"); data/z88-13.0.0+dfsg2/src/cb88o.c:692:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen Y"); data/z88-13.0.0+dfsg2/src/cb88o.c:693:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections Y"); data/z88-13.0.0+dfsg2/src/cb88o.c:695:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen Z"); data/z88-13.0.0+dfsg2/src/cb88o.c:696:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections Z"); data/z88-13.0.0+dfsg2/src/cb88o.c:711:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[80]; data/z88-13.0.0+dfsg2/src/cb88o.c:715:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Licht"); data/z88-13.0.0+dfsg2/src/cb88o.c:716:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Light"); data/z88-13.0.0+dfsg2/src/cb88o.c:718:1: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cstring,"Hidden Line"); data/z88-13.0.0+dfsg2/src/cb88o.c:720:1: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cstring,"Wireframe"); data/z88-13.0.0+dfsg2/src/cb88o.c:722:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"* Spannungen Eckknoten"); data/z88-13.0.0+dfsg2/src/cb88o.c:723:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"* Stresses Corner Nodes"); data/z88-13.0.0+dfsg2/src/cb88o.c:725:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen pro Element"); data/z88-13.0.0+dfsg2/src/cb88o.c:726:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses per Element"); data/z88-13.0.0+dfsg2/src/cb88o.c:728:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen Gausspunkte"); data/z88-13.0.0+dfsg2/src/cb88o.c:729:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses Gauss Points"); data/z88-13.0.0+dfsg2/src/cb88o.c:731:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen X"); data/z88-13.0.0+dfsg2/src/cb88o.c:732:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections X"); data/z88-13.0.0+dfsg2/src/cb88o.c:734:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen Y"); data/z88-13.0.0+dfsg2/src/cb88o.c:735:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections Y"); data/z88-13.0.0+dfsg2/src/cb88o.c:737:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen Z"); data/z88-13.0.0+dfsg2/src/cb88o.c:738:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections Z"); data/z88-13.0.0+dfsg2/src/cb88o.c:753:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[80]; data/z88-13.0.0+dfsg2/src/cb88o.c:757:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Licht"); data/z88-13.0.0+dfsg2/src/cb88o.c:758:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Light"); data/z88-13.0.0+dfsg2/src/cb88o.c:760:1: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cstring,"Hidden Line"); data/z88-13.0.0+dfsg2/src/cb88o.c:762:1: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cstring,"Wireframe"); data/z88-13.0.0+dfsg2/src/cb88o.c:764:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen Eckknoten"); data/z88-13.0.0+dfsg2/src/cb88o.c:765:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses Corner Nodes"); data/z88-13.0.0+dfsg2/src/cb88o.c:767:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"* Spannungen pro Element"); data/z88-13.0.0+dfsg2/src/cb88o.c:768:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"* Stresses per Element"); data/z88-13.0.0+dfsg2/src/cb88o.c:770:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen Gausspunkte"); data/z88-13.0.0+dfsg2/src/cb88o.c:771:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses Gauss Points"); data/z88-13.0.0+dfsg2/src/cb88o.c:773:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen X"); data/z88-13.0.0+dfsg2/src/cb88o.c:774:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections X"); data/z88-13.0.0+dfsg2/src/cb88o.c:776:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen Y"); data/z88-13.0.0+dfsg2/src/cb88o.c:777:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections Y"); data/z88-13.0.0+dfsg2/src/cb88o.c:779:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen Z"); data/z88-13.0.0+dfsg2/src/cb88o.c:780:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections Z"); data/z88-13.0.0+dfsg2/src/cb88o.c:795:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[80]; data/z88-13.0.0+dfsg2/src/cb88o.c:799:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Licht"); data/z88-13.0.0+dfsg2/src/cb88o.c:800:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Light"); data/z88-13.0.0+dfsg2/src/cb88o.c:802:1: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cstring,"Hidden Line"); data/z88-13.0.0+dfsg2/src/cb88o.c:804:1: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cstring,"Wireframe"); data/z88-13.0.0+dfsg2/src/cb88o.c:806:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen Eckknoten"); data/z88-13.0.0+dfsg2/src/cb88o.c:807:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses Corner Nodes"); data/z88-13.0.0+dfsg2/src/cb88o.c:809:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen pro Element"); data/z88-13.0.0+dfsg2/src/cb88o.c:810:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses per Element"); data/z88-13.0.0+dfsg2/src/cb88o.c:812:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"* Spannungen Gausspunkte"); data/z88-13.0.0+dfsg2/src/cb88o.c:813:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"* Stresses Gauss Points"); data/z88-13.0.0+dfsg2/src/cb88o.c:815:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen X"); data/z88-13.0.0+dfsg2/src/cb88o.c:816:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections X"); data/z88-13.0.0+dfsg2/src/cb88o.c:818:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen Y"); data/z88-13.0.0+dfsg2/src/cb88o.c:819:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections Y"); data/z88-13.0.0+dfsg2/src/cb88o.c:821:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen Z"); data/z88-13.0.0+dfsg2/src/cb88o.c:822:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections Z"); data/z88-13.0.0+dfsg2/src/cb88o.c:837:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[80]; data/z88-13.0.0+dfsg2/src/cb88o.c:841:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Licht"); data/z88-13.0.0+dfsg2/src/cb88o.c:842:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Light"); data/z88-13.0.0+dfsg2/src/cb88o.c:844:1: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cstring,"Hidden Line"); data/z88-13.0.0+dfsg2/src/cb88o.c:846:1: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cstring,"Wireframe"); data/z88-13.0.0+dfsg2/src/cb88o.c:848:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen Eckknoten"); data/z88-13.0.0+dfsg2/src/cb88o.c:849:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses Corner Nodes"); data/z88-13.0.0+dfsg2/src/cb88o.c:851:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen pro Element"); data/z88-13.0.0+dfsg2/src/cb88o.c:852:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses per Element"); data/z88-13.0.0+dfsg2/src/cb88o.c:854:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen Gausspunkte"); data/z88-13.0.0+dfsg2/src/cb88o.c:855:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses Gauss Points"); data/z88-13.0.0+dfsg2/src/cb88o.c:857:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"* Verschiebungen X"); data/z88-13.0.0+dfsg2/src/cb88o.c:858:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"* Deflections X"); data/z88-13.0.0+dfsg2/src/cb88o.c:860:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen Y"); data/z88-13.0.0+dfsg2/src/cb88o.c:861:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections Y"); data/z88-13.0.0+dfsg2/src/cb88o.c:863:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen Z"); data/z88-13.0.0+dfsg2/src/cb88o.c:864:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections Z"); data/z88-13.0.0+dfsg2/src/cb88o.c:879:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[80]; data/z88-13.0.0+dfsg2/src/cb88o.c:883:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Licht"); data/z88-13.0.0+dfsg2/src/cb88o.c:884:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Light"); data/z88-13.0.0+dfsg2/src/cb88o.c:886:1: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cstring,"Hidden Line"); data/z88-13.0.0+dfsg2/src/cb88o.c:888:1: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cstring,"Wireframe"); data/z88-13.0.0+dfsg2/src/cb88o.c:890:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen Eckknoten"); data/z88-13.0.0+dfsg2/src/cb88o.c:891:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses Corner Nodes"); data/z88-13.0.0+dfsg2/src/cb88o.c:893:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen pro Element"); data/z88-13.0.0+dfsg2/src/cb88o.c:894:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses per Element"); data/z88-13.0.0+dfsg2/src/cb88o.c:896:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen Gausspunkte"); data/z88-13.0.0+dfsg2/src/cb88o.c:897:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses Gauss Points"); data/z88-13.0.0+dfsg2/src/cb88o.c:899:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen X"); data/z88-13.0.0+dfsg2/src/cb88o.c:900:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections X"); data/z88-13.0.0+dfsg2/src/cb88o.c:902:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"* Verschiebungen Y"); data/z88-13.0.0+dfsg2/src/cb88o.c:903:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"* Deflections Y"); data/z88-13.0.0+dfsg2/src/cb88o.c:905:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen Z"); data/z88-13.0.0+dfsg2/src/cb88o.c:906:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections Z"); data/z88-13.0.0+dfsg2/src/cb88o.c:921:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[80]; data/z88-13.0.0+dfsg2/src/cb88o.c:925:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Licht"); data/z88-13.0.0+dfsg2/src/cb88o.c:926:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Light"); data/z88-13.0.0+dfsg2/src/cb88o.c:928:1: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cstring,"Hidden Line"); data/z88-13.0.0+dfsg2/src/cb88o.c:930:1: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cstring,"Wireframe"); data/z88-13.0.0+dfsg2/src/cb88o.c:932:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen Eckknoten"); data/z88-13.0.0+dfsg2/src/cb88o.c:933:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses Corner Nodes"); data/z88-13.0.0+dfsg2/src/cb88o.c:935:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen pro Element"); data/z88-13.0.0+dfsg2/src/cb88o.c:936:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses per Element"); data/z88-13.0.0+dfsg2/src/cb88o.c:938:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen Gausspunkte"); data/z88-13.0.0+dfsg2/src/cb88o.c:939:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses Gauss Points"); data/z88-13.0.0+dfsg2/src/cb88o.c:941:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen X"); data/z88-13.0.0+dfsg2/src/cb88o.c:942:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections X"); data/z88-13.0.0+dfsg2/src/cb88o.c:944:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen Y"); data/z88-13.0.0+dfsg2/src/cb88o.c:945:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections Y"); data/z88-13.0.0+dfsg2/src/cb88o.c:947:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"* Verschiebungen Z"); data/z88-13.0.0+dfsg2/src/cb88o.c:948:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"* Deflections Z"); data/z88-13.0.0+dfsg2/src/cb88o.c:998:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ckvon[20],ckbis[20]; data/z88-13.0.0+dfsg2/src/cb88o.c:1006:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[80]; data/z88-13.0.0+dfsg2/src/cb88o.c:1012:1: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ckvon,"%ld",jkvon); data/z88-13.0.0+dfsg2/src/cb88o.c:1013:1: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ckbis,"%ld",jkbis); data/z88-13.0.0+dfsg2/src/cb88o.c:1015:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"KNOTENNUM."); data/z88-13.0.0+dfsg2/src/cb88o.c:1016:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"NODE NUM.."); data/z88-13.0.0+dfsg2/src/cb88o.c:1022:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Von"); data/z88-13.0.0+dfsg2/src/cb88o.c:1023:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"From"); data/z88-13.0.0+dfsg2/src/cb88o.c:1025:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Bis"); data/z88-13.0.0+dfsg2/src/cb88o.c:1026:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"To"); data/z88-13.0.0+dfsg2/src/cb88o.c:1052:10: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). jkvon= atol(cvon); data/z88-13.0.0+dfsg2/src/cb88o.c:1053:10: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). jkbis= atol(cbis); data/z88-13.0.0+dfsg2/src/cb88o.c:1070:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ckvon[20],ckbis[20]; data/z88-13.0.0+dfsg2/src/cb88o.c:1078:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[80]; data/z88-13.0.0+dfsg2/src/cb88o.c:1084:1: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ckvon,"%ld",jevon); data/z88-13.0.0+dfsg2/src/cb88o.c:1085:1: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ckbis,"%ld",jebis); data/z88-13.0.0+dfsg2/src/cb88o.c:1087:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"ELEMENTNUM."); data/z88-13.0.0+dfsg2/src/cb88o.c:1088:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"ELEMENT NUM.."); data/z88-13.0.0+dfsg2/src/cb88o.c:1094:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Von"); data/z88-13.0.0+dfsg2/src/cb88o.c:1095:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"From"); data/z88-13.0.0+dfsg2/src/cb88o.c:1097:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Bis"); data/z88-13.0.0+dfsg2/src/cb88o.c:1098:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"To"); data/z88-13.0.0+dfsg2/src/cb88o.c:1124:10: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). jevon= atol(cvon); data/z88-13.0.0+dfsg2/src/cb88o.c:1125:10: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). jebis= atol(cbis); data/z88-13.0.0+dfsg2/src/cb88o.c:1157:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cfux[31],cfuy[31],cfuz[31]; data/z88-13.0.0+dfsg2/src/cb88o.c:1158:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[80]; data/z88-13.0.0+dfsg2/src/cb88o.c:1168:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"VERGROESSERUNG VER."); data/z88-13.0.0+dfsg2/src/cb88o.c:1169:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"MAGNIFICATION DEFL."); data/z88-13.0.0+dfsg2/src/cb88o.c:1227:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char crotx[31],croty[31],crotz[31]; data/z88-13.0.0+dfsg2/src/cb88o.c:1228:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[80]; data/z88-13.0.0+dfsg2/src/cb88o.c:1238:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"ROTATIONEN 3-D"); data/z88-13.0.0+dfsg2/src/cb88o.c:1239:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"ROTATIONS 3-D"); data/z88-13.0.0+dfsg2/src/cb88o.c:1302:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char czm[31]; data/z88-13.0.0+dfsg2/src/cb88o.c:1303:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[80]; data/z88-13.0.0+dfsg2/src/cb88o.c:1311:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Z-Limit zum Betrachter"); data/z88-13.0.0+dfsg2/src/cb88o.c:1312:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Z Limit towards you"); data/z88-13.0.0+dfsg2/src/cb88o.c:1642:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fo2= fopen("z88o2.txt","r"); data/z88-13.0.0+dfsg2/src/cb88o.c:1661:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fi2= fopen("z88i2.txt","r"); data/z88-13.0.0+dfsg2/src/cb88o.c:1690:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fi5= fopen("z88i5.txt","r"); data/z88-13.0.0+dfsg2/src/cb88o.c:1720:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fo8= fopen("z88o8.txt","r"); data/z88-13.0.0+dfsg2/src/cb88o.c:1741:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fo5= fopen("z88o5.txt","r"); data/z88-13.0.0+dfsg2/src/cosm88.c:100:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[255]; data/z88-13.0.0+dfsg2/src/cosm88.c:112:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fpro= fopen(ccos,"r"))== NULL) data/z88-13.0.0+dfsg2/src/cosm88.c:128:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fi1= fopen("z88i1.txt","w"))== NULL) data/z88-13.0.0+dfsg2/src/cosm88.c:141:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fi2= fopen("z88i2.txt","w"))== NULL) data/z88-13.0.0+dfsg2/src/cosm88.c:154:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fi3= fopen("z88i3.txt","w"))== NULL) data/z88-13.0.0+dfsg2/src/cosm88.c:210:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nkn= atoi(cteils); data/z88-13.0.0+dfsg2/src/cosm88.c:300:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nkn= atoi(cteils); data/z88-13.0.0+dfsg2/src/cosm88.c:332:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). k= atoi(cteils); data/z88-13.0.0+dfsg2/src/cosm88.c:339:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). koi[i] = atoi(cteils); data/z88-13.0.0+dfsg2/src/cosm88.c:359:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). k= atoi(cteils); data/z88-13.0.0+dfsg2/src/cosm88.c:366:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). koi[i] = atoi(cteils); data/z88-13.0.0+dfsg2/src/cosm88.c:399:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). k= atoi(cteils); data/z88-13.0.0+dfsg2/src/cosm88.c:406:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). koi[i] = atoi(cteils); data/z88-13.0.0+dfsg2/src/cosm88.c:440:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). k= atoi(cteils); data/z88-13.0.0+dfsg2/src/cosm88.c:447:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). koi[i] = atoi(cteils); data/z88-13.0.0+dfsg2/src/cosm88.c:464:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nkn= atoi(cteils); data/z88-13.0.0+dfsg2/src/cosm88.c:509:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nkn= atoi(cteils); data/z88-13.0.0+dfsg2/src/cosm88.c:643:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nkn= atoi(cteils); data/z88-13.0.0+dfsg2/src/dnas88.c:108:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[255],c2zeile[255],cdummy[80],cdummy2[80]; data/z88-13.0.0+dfsg2/src/dnas88.c:113:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fpro= fopen(cnas,"r"))== NULL) data/z88-13.0.0+dfsg2/src/dnas88.c:129:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fin= fopen(cin,"w+"))== NULL) data/z88-13.0.0+dfsg2/src/dnas88.c:156:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fi1= fopen(ci1,"w"))== NULL) data/z88-13.0.0+dfsg2/src/dnas88.c:169:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fi2= fopen(ci2,"w"))== NULL) data/z88-13.0.0+dfsg2/src/dnas88.c:182:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fi3= fopen(ci3,"w"))== NULL) data/z88-13.0.0+dfsg2/src/dnas88.c:195:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fi5= fopen(ci5,"w"))== NULL) data/z88-13.0.0+dfsg2/src/dyn88d.c:107:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256], cdummy[80]; data/z88-13.0.0+dfsg2/src/dyn88d.c:114:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdyn= fopen(cdyn,"r"); data/z88-13.0.0+dfsg2/src/dyn88e.c:111:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256], cdummy[80]; data/z88-13.0.0+dfsg2/src/dyn88e.c:118:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdyn= fopen(cdyn,"r"); data/z88-13.0.0+dfsg2/src/dyn88f.c:112:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256], cdummy[80]; data/z88-13.0.0+dfsg2/src/dyn88f.c:127:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdyn= fopen(cdyn,"r"); data/z88-13.0.0+dfsg2/src/dyn88i1.c:103:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256], cdummy[80]; data/z88-13.0.0+dfsg2/src/dyn88i1.c:110:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdyn= fopen(cdyn,"r"); data/z88-13.0.0+dfsg2/src/dyn88i2.c:121:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256], cdummy[80]; data/z88-13.0.0+dfsg2/src/dyn88i2.c:136:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdyn= fopen(cdyn,"r"); data/z88-13.0.0+dfsg2/src/dyn88n.c:109:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256], cdummy[80]; data/z88-13.0.0+dfsg2/src/dyn88n.c:115:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdyn= fopen(cdyn,"r"); data/z88-13.0.0+dfsg2/src/dyn88o.c:115:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256], cdummy[80]; data/z88-13.0.0+dfsg2/src/dyn88o.c:121:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdyn= fopen(cdyn,"r"); data/z88-13.0.0+dfsg2/src/dyn88v.c:86:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256], cdummy[80]; data/z88-13.0.0+dfsg2/src/dyn88v.c:93:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdyn= fopen(cdyn,"r"); data/z88-13.0.0+dfsg2/src/dyn88x.c:120:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256], cdummy[80]; data/z88-13.0.0+dfsg2/src/dyn88x.c:139:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdyn= fopen(cdyn,"r"); data/z88-13.0.0+dfsg2/src/fr_func.c:54:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[80]; data/z88-13.0.0+dfsg2/src/g1i188.c:73:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/g1i388.c:68:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/g1i488.c:69:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/g2i188.c:74:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/g3i188.c:77:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/g4i188.c:73:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256],clina[256]; data/z88-13.0.0+dfsg2/src/g5i188.c:73:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/gxi288.c:69:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/gxi288.c:165:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256],clina[256]; data/z88-13.0.0+dfsg2/src/gxi588.c:69:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/gxi588.c:140:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/koi88x.c:85:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/lan88c.c:78:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/lan88c.c:83:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fwlo= fopen(clgd, "w+"); data/z88-13.0.0+dfsg2/src/lan88c.c:96:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdyn= fopen(cdyn,"r"); data/z88-13.0.0+dfsg2/src/lan88d.c:78:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/lan88d.c:83:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fwlo= fopen(clgd, "w+"); data/z88-13.0.0+dfsg2/src/lan88d.c:96:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdyn= fopen(cdyn,"r"); data/z88-13.0.0+dfsg2/src/lan88e.c:78:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/lan88e.c:83:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fwlo= fopen(clgd, "w+"); data/z88-13.0.0+dfsg2/src/lan88e.c:96:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdyn= fopen(cdyn,"r"); data/z88-13.0.0+dfsg2/src/lan88f.c:78:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/lan88f.c:83:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fwlo= fopen(clgd, "w+"); data/z88-13.0.0+dfsg2/src/lan88f.c:96:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdyn= fopen(cdyn,"r"); data/z88-13.0.0+dfsg2/src/lan88g.c:78:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/lan88g.c:83:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fwlo= fopen(clgd, "w+"); data/z88-13.0.0+dfsg2/src/lan88g.c:96:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdyn= fopen(cdyn,"r"); data/z88-13.0.0+dfsg2/src/lan88h.c:78:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/lan88h.c:83:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fwlo= fopen(clgd, "w+"); data/z88-13.0.0+dfsg2/src/lan88h.c:96:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdyn= fopen(cdyn,"r"); data/z88-13.0.0+dfsg2/src/lan88i1.c:78:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/lan88i1.c:83:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fl1= fopen(cl1, "w+"); data/z88-13.0.0+dfsg2/src/lan88i1.c:96:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdyn= fopen(cdyn,"r"); data/z88-13.0.0+dfsg2/src/lan88i2.c:78:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/lan88i2.c:83:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fl2= fopen(cl2, "w+"); data/z88-13.0.0+dfsg2/src/lan88i2.c:96:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdyn= fopen(cdyn,"r"); data/z88-13.0.0+dfsg2/src/lan88n.c:78:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/lan88n.c:83:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fwlo= fopen(clgd, "w+"); data/z88-13.0.0+dfsg2/src/lan88n.c:96:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdyn= fopen(cdyn,"r"); data/z88-13.0.0+dfsg2/src/lan88o.c:76:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/lan88o.c:81:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fwlo= fopen(clgd, "w+"); data/z88-13.0.0+dfsg2/src/lan88o.c:94:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdyn= fopen(cdyn,"r"); data/z88-13.0.0+dfsg2/src/lan88v.c:78:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/lan88v.c:83:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fwlo= fopen(clgd, "w+"); data/z88-13.0.0+dfsg2/src/lan88v.c:96:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdyn= fopen(cdyn,"r"); data/z88-13.0.0+dfsg2/src/lan88x.c:78:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/lan88x.c:83:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fwlo= fopen(clgd, "w+"); data/z88-13.0.0+dfsg2/src/lan88x.c:96:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdyn= fopen(cdyn,"r"); data/z88-13.0.0+dfsg2/src/m10.c:86:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/m15.c:75:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[80]; data/z88-13.0.0+dfsg2/src/m15.c:86:1: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cstring,"%+#10.2lE ~%+#10.2lE",fspa[1],fspa[2]); data/z88-13.0.0+dfsg2/src/m15.c:93:1: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cstring,"%+#10.2lE ~%+#10.2lE",fspa[2],fspa[3]); data/z88-13.0.0+dfsg2/src/m15.c:100:1: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cstring,"%+#10.2lE ~%+#10.2lE",fspa[3],fspa[4]); data/z88-13.0.0+dfsg2/src/m15.c:107:1: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cstring,"%+#10.2lE ~%+#10.2lE",fspa[4],fspa[5]); data/z88-13.0.0+dfsg2/src/m15.c:114:1: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cstring,"%+#10.2lE ~%+#10.2lE",fspa[5],fspa[6]); data/z88-13.0.0+dfsg2/src/m15.c:121:1: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cstring,"%+#10.2lE ~%+#10.2lE",fspa[6],fspa[7]); data/z88-13.0.0+dfsg2/src/m15.c:128:1: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cstring,"%+#10.2lE ~%+#10.2lE",fspa[7],fspa[8]); data/z88-13.0.0+dfsg2/src/m15.c:135:1: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cstring,"%+#10.2lE ~%+#10.2lE",fspa[8],fspa[9]); data/z88-13.0.0+dfsg2/src/m15.c:142:1: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cstring,"%+#10.2lE ~%+#10.2lE",fspa[9],fspa[10]); data/z88-13.0.0+dfsg2/src/m15.c:149:1: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cstring,"%+#10.2lE ~%+#10.2lE",fspa[10],fspa[11]); data/z88-13.0.0+dfsg2/src/m15.c:156:1: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cstring,"%+#10.2lE ~%+#10.2lE",fspa[11],fspa[12]); data/z88-13.0.0+dfsg2/src/m15.c:163:31: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1 && isflag == 0)strcpy(cstring,"keine V-Spannungen"); data/z88-13.0.0+dfsg2/src/m15.c:164:31: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2 && isflag == 0)strcpy(cstring,"no reduced Stresses"); data/z88-13.0.0+dfsg2/src/m15.c:165:31: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1 && isflag == 1)strcpy(cstring,"V-Spannungen (GEH)"); data/z88-13.0.0+dfsg2/src/m15.c:166:31: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2 && isflag == 1)strcpy(cstring,"v.Mises Stresses"); data/z88-13.0.0+dfsg2/src/m15.c:167:31: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1 && isflag == 2)strcpy(cstring,"V-Spannungen (NH)"); data/z88-13.0.0+dfsg2/src/m15.c:168:31: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2 && isflag == 2)strcpy(cstring,"principal Stresses"); data/z88-13.0.0+dfsg2/src/m15.c:169:31: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1 && isflag == 3)strcpy(cstring,"V-Spannungen (SH)"); data/z88-13.0.0+dfsg2/src/m15.c:170:31: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2 && isflag == 3)strcpy(cstring,"Tresca Stresses"); data/z88-13.0.0+dfsg2/src/m15.c:178:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1)strcpy(cstring,"in den Eckknoten"); data/z88-13.0.0+dfsg2/src/m15.c:179:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2)strcpy(cstring,"in corner nodes"); data/z88-13.0.0+dfsg2/src/m15.c:186:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1)strcpy(cstring,"pro Element gemittelt"); data/z88-13.0.0+dfsg2/src/m15.c:187:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2)strcpy(cstring,"mean value per element"); data/z88-13.0.0+dfsg2/src/m15.c:194:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 1)sprintf(cstring,"in %ld Gausspunkten",igpanz); data/z88-13.0.0+dfsg2/src/m15.c:195:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 2)sprintf(cstring,"in %ld Gauss points",igpanz); data/z88-13.0.0+dfsg2/src/m15.c:204:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1)strcpy(cstring,"X-Verschiebungen"); data/z88-13.0.0+dfsg2/src/m15.c:205:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2)strcpy(cstring,"X Displacements"); data/z88-13.0.0+dfsg2/src/m15.c:213:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1)strcpy(cstring,"Y-Verschiebungen"); data/z88-13.0.0+dfsg2/src/m15.c:214:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2)strcpy(cstring,"Y Displacements"); data/z88-13.0.0+dfsg2/src/m15.c:222:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1)strcpy(cstring,"Z-Verschiebungen"); data/z88-13.0.0+dfsg2/src/m15.c:223:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2)strcpy(cstring,"Z Displacements"); data/z88-13.0.0+dfsg2/src/m15.c:245:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[80]; data/z88-13.0.0+dfsg2/src/m15.c:267:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cstring,"%ld",i); data/z88-13.0.0+dfsg2/src/m15.c:299:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[80]; data/z88-13.0.0+dfsg2/src/m15.c:338:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cstring,"%ld",i); data/z88-13.0.0+dfsg2/src/m15.c:362:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cstring,"%ld",i); data/z88-13.0.0+dfsg2/src/m15.c:392:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cstring,"%ld",i); data/z88-13.0.0+dfsg2/src/m15.c:426:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cstring,"%ld",i); data/z88-13.0.0+dfsg2/src/m15.c:461:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cstring,"%ld",i); data/z88-13.0.0+dfsg2/src/m15.c:489:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cstring,"%ld",i); data/z88-13.0.0+dfsg2/src/m15.c:517:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cstring,"%ld",i); data/z88-13.0.0+dfsg2/src/m15.c:577:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cstring,"%ld",i); data/z88-13.0.0+dfsg2/src/m15.c:622:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cstring,"%ld",i); data/z88-13.0.0+dfsg2/src/m15.c:687:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(cstring,"%ld",i); data/z88-13.0.0+dfsg2/src/m15.c:748:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[80]; data/z88-13.0.0+dfsg2/src/m15.c:759:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 1) sprintf(cstring,"U1=UX=0 (Platten:UZ=0)"); data/z88-13.0.0+dfsg2/src/m15.c:760:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 2) sprintf(cstring,"U1=UX=0 (Plates: UZ=0)"); data/z88-13.0.0+dfsg2/src/m15.c:767:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 1) sprintf(cstring,"U2=UY=0 (Platten:RotX=0)"); data/z88-13.0.0+dfsg2/src/m15.c:768:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 2) sprintf(cstring,"U2=UY=0 (Plates: RotX=0)"); data/z88-13.0.0+dfsg2/src/m15.c:775:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 1) sprintf(cstring,"U3=UZ=0 (Platten:RotY=0)"); data/z88-13.0.0+dfsg2/src/m15.c:776:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 2) sprintf(cstring,"U3=UZ=0 (Plates: RotY=0)"); data/z88-13.0.0+dfsg2/src/m15.c:783:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 1) sprintf(cstring,"U4=RotX=0"); data/z88-13.0.0+dfsg2/src/m15.c:784:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 2) sprintf(cstring,"U4=RotX=0"); data/z88-13.0.0+dfsg2/src/m15.c:791:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 1) sprintf(cstring,"U5=RotY=0"); data/z88-13.0.0+dfsg2/src/m15.c:792:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 2) sprintf(cstring,"U5=RotY=0"); data/z88-13.0.0+dfsg2/src/m15.c:799:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 1) sprintf(cstring,"U6=RotZ=0"); data/z88-13.0.0+dfsg2/src/m15.c:800:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 2) sprintf(cstring,"U6=RotZ=0"); data/z88-13.0.0+dfsg2/src/m15.c:807:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 1) sprintf(cstring,"Verschiebungen gegeben"); data/z88-13.0.0+dfsg2/src/m15.c:808:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 2) sprintf(cstring,"Displacements given"); data/z88-13.0.0+dfsg2/src/m15.c:815:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 1) sprintf(cstring,"Druck/Oberflaechenlasten"); data/z88-13.0.0+dfsg2/src/m15.c:816:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 2) sprintf(cstring,"Surface/Pressure Loads"); data/z88-13.0.0+dfsg2/src/m15.c:823:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 1) sprintf(cstring,"Kraefte X"); data/z88-13.0.0+dfsg2/src/m15.c:824:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 2) sprintf(cstring,"Forces X"); data/z88-13.0.0+dfsg2/src/m15.c:831:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 1) sprintf(cstring,"Kraefte Y"); data/z88-13.0.0+dfsg2/src/m15.c:832:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 2) sprintf(cstring,"Forces Y"); data/z88-13.0.0+dfsg2/src/m15.c:839:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 1) sprintf(cstring,"Kraefte Z"); data/z88-13.0.0+dfsg2/src/m15.c:840:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if(LANG == 2) sprintf(cstring,"Forces Z"); data/z88-13.0.0+dfsg2/src/m16.c:357:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/m9.c:89:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/m9.c:133:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/m9.c:194:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/m9.c:253:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/nast88.c:103:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[255],c2zeile[255],cdummy[80],cdummy2[80]; data/z88-13.0.0+dfsg2/src/nast88.c:113:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fpro= fopen(cnas,"r"))== NULL) data/z88-13.0.0+dfsg2/src/nast88.c:129:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fin= fopen(cin,"w+"))== NULL) data/z88-13.0.0+dfsg2/src/nast88.c:156:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fi1= fopen("z88i1.txt","w"))== NULL) data/z88-13.0.0+dfsg2/src/nast88.c:169:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fi2= fopen("z88i2.txt","w"))== NULL) data/z88-13.0.0+dfsg2/src/nast88.c:182:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fi3= fopen("z88i3.txt","w"))== NULL) data/z88-13.0.0+dfsg2/src/r1y88i.c:104:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f1y= fopen(c1y,"rb"); data/z88-13.0.0+dfsg2/src/r4y88i.c:81:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f4y= fopen(c4y,"rb"); data/z88-13.0.0+dfsg2/src/rcol88c.c:65:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256], cdummy[80]; data/z88-13.0.0+dfsg2/src/rcol88c.c:70:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fcol= fopen("z88.fcd","rb"); /* fcd = fonts, colors, dimensions */ data/z88-13.0.0+dfsg2/src/rcoo88.c:84:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256], cdummy[80]; data/z88-13.0.0+dfsg2/src/rcoo88.c:89:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fcol= fopen("z88.fcd","rb"); /* fcd = fonts, colors, dimensions */ data/z88-13.0.0+dfsg2/src/rdy88h.c:77:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256], cdummy[80]; data/z88-13.0.0+dfsg2/src/rdy88h.c:83:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdyn= fopen(cdyn,"r"); data/z88-13.0.0+dfsg2/src/rea88x.c:123:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/rea88x.c:137:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fz88= fopen(ci1,"r"); data/z88-13.0.0+dfsg2/src/rea88x.c:154:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fz88= fopen(cni,"r"); data/z88-13.0.0+dfsg2/src/rea88x.c:532:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fi2= fopen(ci2,"r"); data/z88-13.0.0+dfsg2/src/rea88x.c:557:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fi3= fopen(ci3,"r"); data/z88-13.0.0+dfsg2/src/rea88x.c:578:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fi5= fopen(ci5,"r"); data/z88-13.0.0+dfsg2/src/ri188.c:128:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/ri188.c:139:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fi1= fopen(ci1,"r"); data/z88-13.0.0+dfsg2/src/ri188i.c:128:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/ri188i.c:139:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fi1= fopen(ci1,"r"); data/z88-13.0.0+dfsg2/src/ri588.c:116:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/ri588.c:127:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fi5= fopen(ci5,"r"); data/z88-13.0.0+dfsg2/src/ri588i.c:115:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/ri588i.c:126:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fi5= fopen(ci5,"r"); data/z88-13.0.0+dfsg2/src/riy88.c:103:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f1y= fopen(c1y,"rb"); data/z88-13.0.0+dfsg2/src/riy88.c:112:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f3y= fopen(c3y,"rb"); data/z88-13.0.0+dfsg2/src/riy88d.c:107:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f1y= fopen(c1y,"rb"); data/z88-13.0.0+dfsg2/src/riy88d.c:116:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f3y= fopen(c3y,"rb"); data/z88-13.0.0+dfsg2/src/rni88.c:104:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/rni88.c:116:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fni= fopen(cni,"r"); data/z88-13.0.0+dfsg2/src/rni88.c:129:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fi1= fopen(ci1,"w+"); data/z88-13.0.0+dfsg2/src/w4y88i.c:81:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f4y= fopen(c4y,"w+b"); data/z88-13.0.0+dfsg2/src/wria88f.c:153:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f1y= fopen(c1y,"w+b"); data/z88-13.0.0+dfsg2/src/wria88f.c:163:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fo0= fopen(co0,"w+"); data/z88-13.0.0+dfsg2/src/wria88i.c:155:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f1y= fopen(c1y,"w+b"); data/z88-13.0.0+dfsg2/src/wria88i.c:165:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fo0= fopen(co0,"w+"); data/z88-13.0.0+dfsg2/src/wria88x.c:137:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fz88= fopen(ci1,"w"); data/z88-13.0.0+dfsg2/src/wria88x.c:176:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fz88= fopen(cni,"w"); data/z88-13.0.0+dfsg2/src/wria88x.c:391:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fi2= fopen(ci2,"w"); data/z88-13.0.0+dfsg2/src/wria88x.c:423:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fi3= fopen(ci3,"w"); data/z88-13.0.0+dfsg2/src/wria88x.c:457:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fi5= fopen(ci5,"w"); data/z88-13.0.0+dfsg2/src/z88ai.c:106:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char flags[2], high_dyn_flag; data/z88-13.0.0+dfsg2/src/z88cc.c:132:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/z88cc.c:143:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fi2= fopen(ci2,"r"); data/z88-13.0.0+dfsg2/src/z88cc.c:153:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f3y= fopen(c3y,"w+b"); data/z88-13.0.0+dfsg2/src/z88cc.c:163:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fo1= fopen(co1,"w+"); data/z88-13.0.0+dfsg2/src/z88cc.c:173:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fo2= fopen(co2,"w+"); data/z88-13.0.0+dfsg2/src/z88ci.c:137:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/z88ci.c:148:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fi2= fopen(ci2,"r"); data/z88-13.0.0+dfsg2/src/z88ci.c:158:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fi4= fopen(ci4,"r"); data/z88-13.0.0+dfsg2/src/z88ci.c:168:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f3y= fopen(c3y,"w+b"); data/z88-13.0.0+dfsg2/src/z88ci.c:178:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fo1= fopen(co1,"w+"); data/z88-13.0.0+dfsg2/src/z88ci.c:188:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fo2= fopen(co2,"w+"); data/z88-13.0.0+dfsg2/src/z88com.c:81:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char CEDITOR[128],CBROWSER[128],CPREFIX[128]; data/z88-13.0.0+dfsg2/src/z88com.c:83:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cdyn[12] = "z88.dyn"; data/z88-13.0.0+dfsg2/src/z88com.c:84:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char clgd[12] = "z88com.log"; data/z88-13.0.0+dfsg2/src/z88com.c:139:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[128]; data/z88-13.0.0+dfsg2/src/z88com.c:192:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Der Z88-Commander Version 13.0"); data/z88-13.0.0+dfsg2/src/z88com.c:193:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"The Z88-Commander Version 13.0"); data/z88-13.0.0+dfsg2/src/z88com.c:201:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Ueberblick"); data/z88-13.0.0+dfsg2/src/z88com.c:202:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Overview"); data/z88-13.0.0+dfsg2/src/z88com.c:206:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Aufrufen der Online-Hilfe fuer einen Ueberblick"); data/z88-13.0.0+dfsg2/src/z88com.c:207:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Call the Online Help for an Overview"); data/z88-13.0.0+dfsg2/src/z88com.c:210:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Info"); data/z88-13.0.0+dfsg2/src/z88com.c:211:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"About"); data/z88-13.0.0+dfsg2/src/z88com.c:215:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Ende"); data/z88-13.0.0+dfsg2/src/z88com.c:216:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Exit"); data/z88-13.0.0+dfsg2/src/z88com.c:220:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Hilfe aus"); data/z88-13.0.0+dfsg2/src/z88com.c:221:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Help is off"); data/z88-13.0.0+dfsg2/src/z88com.c:225:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Umschalten Hilfemode - Befehlsmode"); data/z88-13.0.0+dfsg2/src/z88com.c:226:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Toggle Help Mode - Command Mode"); data/z88-13.0.0+dfsg2/src/z88com.c:232:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Speicher-Steuerdatei Z88.DYN editieren"); data/z88-13.0.0+dfsg2/src/z88com.c:233:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Edit the Memory Definition File Z88.DYN"); data/z88-13.0.0+dfsg2/src/z88com.c:239:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Datei der Einstellungen Z88 fuer UNIX Z88.FCD editieren"); data/z88-13.0.0+dfsg2/src/z88com.c:240:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Edit the Defaults for UNIX File Z88.FCD"); data/z88-13.0.0+dfsg2/src/z88com.c:248:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Editieren der Eingabedateien"); data/z88-13.0.0+dfsg2/src/z88com.c:249:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Edit the Input Files"); data/z88-13.0.0+dfsg2/src/z88com.c:255:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Netzgenerator-Eingabedatei Z88NI.TXT editieren"); data/z88-13.0.0+dfsg2/src/z88com.c:256:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Edit the Mesh Genrator Input File Z88NI.TXT"); data/z88-13.0.0+dfsg2/src/z88com.c:262:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"allgemeine Strukturdaten Z88I1.TXT editieren"); data/z88-13.0.0+dfsg2/src/z88com.c:263:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Edit the Structure File Z88I1.TXT"); data/z88-13.0.0+dfsg2/src/z88com.c:269:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Randbedingungen Z88I2.TXT editieren"); data/z88-13.0.0+dfsg2/src/z88com.c:270:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Edit the Boundary Condition File Z88I2.TXT"); data/z88-13.0.0+dfsg2/src/z88com.c:276:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Steuerdatei Z88I3.TXT fuer die Spannungsberechnung editieren"); data/z88-13.0.0+dfsg2/src/z88com.c:277:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Edit the Flag File for Stresses Z88I3.TXT"); data/z88-13.0.0+dfsg2/src/z88com.c:283:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Steuerdatei Z88I4.TXT fuer die Solver editieren"); data/z88-13.0.0+dfsg2/src/z88com.c:284:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Edit the Flag File for the Solvers Z88I4.TXT"); data/z88-13.0.0+dfsg2/src/z88com.c:290:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Datei der Oberflaechenlasten Z88I5.TXT editieren"); data/z88-13.0.0+dfsg2/src/z88com.c:291:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Edit the File for Surface Loads Z88I5.TXT"); data/z88-13.0.0+dfsg2/src/z88com.c:299:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Prae- und Postprozessoren"); data/z88-13.0.0+dfsg2/src/z88com.c:300:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Pre- and Postprocessors"); data/z88-13.0.0+dfsg2/src/z88com.c:306:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Der Filechecker"); data/z88-13.0.0+dfsg2/src/z88com.c:307:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"The File Checker"); data/z88-13.0.0+dfsg2/src/z88com.c:313:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Der Netzgenerator"); data/z88-13.0.0+dfsg2/src/z88com.c:314:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"The Mesh Generator"); data/z88-13.0.0+dfsg2/src/z88com.c:320:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Die Spannungsberechnung"); data/z88-13.0.0+dfsg2/src/z88com.c:321:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Compute Stresses"); data/z88-13.0.0+dfsg2/src/z88com.c:327:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Die Knotenkraftberechnung"); data/z88-13.0.0+dfsg2/src/z88com.c:328:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Compute Nodal Forces"); data/z88-13.0.0+dfsg2/src/z88com.c:334:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Das OpenGL-Plotprogramm"); data/z88-13.0.0+dfsg2/src/z88com.c:335:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"The OpenGL Plot Program"); data/z88-13.0.0+dfsg2/src/z88com.c:343:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"CAD-Konverter"); data/z88-13.0.0+dfsg2/src/z88com.c:344:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"CAD Converters"); data/z88-13.0.0+dfsg2/src/z88com.c:350:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Der NASTRAN/COSMOS-Konverter"); data/z88-13.0.0+dfsg2/src/z88com.c:351:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"The NASTRAN/COSMOS Converter"); data/z88-13.0.0+dfsg2/src/z88com.c:357:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Der Cuthill-MCKee-Umnummerierer"); data/z88-13.0.0+dfsg2/src/z88com.c:358:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"The Cuthill-McKee Program"); data/z88-13.0.0+dfsg2/src/z88com.c:364:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"von Z88I1.TXT nach Z88X.DXF"); data/z88-13.0.0+dfsg2/src/z88com.c:365:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"from Z88I1.TXT to Z88X.DXF"); data/z88-13.0.0+dfsg2/src/z88com.c:371:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"von Z88I*.TXT nach Z88X.DXF"); data/z88-13.0.0+dfsg2/src/z88com.c:372:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"from Z88I*.TXT to Z88X.DXF"); data/z88-13.0.0+dfsg2/src/z88com.c:378:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"von Z88NI.TXT nach Z88X.DXF"); data/z88-13.0.0+dfsg2/src/z88com.c:379:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"from Z88NI.TXT to Z88X.DXF"); data/z88-13.0.0+dfsg2/src/z88com.c:385:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"von Z88X.DXF nach Z88I1.TXT"); data/z88-13.0.0+dfsg2/src/z88com.c:386:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"from Z88X.DXF to Z88I1.TXT"); data/z88-13.0.0+dfsg2/src/z88com.c:392:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"von Z88X.DXF nach Z88I*.TXT"); data/z88-13.0.0+dfsg2/src/z88com.c:393:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"from Z88X.DXF to Z88I*.TXT"); data/z88-13.0.0+dfsg2/src/z88com.c:399:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"von Z88X.DXF nach Z88NI.TXT"); data/z88-13.0.0+dfsg2/src/z88com.c:400:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"from Z88X.DXF to Z88NI.TXT"); data/z88-13.0.0+dfsg2/src/z88com.c:408:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Die Solver"); data/z88-13.0.0+dfsg2/src/z88com.c:409:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"The Solvers"); data/z88-13.0.0+dfsg2/src/z88com.c:415:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Der Cholesky-Solver fuer kleine Strukturen, Rechenmode"); data/z88-13.0.0+dfsg2/src/z88com.c:416:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"The Cholesky Solver for small structures, Compute Mode"); data/z88-13.0.0+dfsg2/src/z88com.c:422:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Der Cholesky-Solver fuer kleine Strukturen, Testmode"); data/z88-13.0.0+dfsg2/src/z88com.c:423:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"The Cholesky Solver for small structures, Test Mode"); data/z88-13.0.0+dfsg2/src/z88com.c:429:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Der Sparsematrix-Solver Part 1 fuer Z88I2 und Z88PAR"); data/z88-13.0.0+dfsg2/src/z88com.c:430:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"The Sparse Matrix Solver Part 1 for Z88I2 and Z88PAR"); data/z88-13.0.0+dfsg2/src/z88com.c:436:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring, data/z88-13.0.0+dfsg2/src/z88com.c:438:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring, data/z88-13.0.0+dfsg2/src/z88com.c:445:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring, data/z88-13.0.0+dfsg2/src/z88com.c:447:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring, data/z88-13.0.0+dfsg2/src/z88com.c:454:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Der Sparsematrix-Solver Part 2 fuer mittlere Strukturen: Z88PAR"); data/z88-13.0.0+dfsg2/src/z88com.c:455:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"The Sparse Matrix Solver Part 2 for medium sized structures: Z88PAR"); data/z88-13.0.0+dfsg2/src/z88com.c:463:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Editieren der Ausgabedateien"); data/z88-13.0.0+dfsg2/src/z88com.c:464:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Edit the Output Files"); data/z88-13.0.0+dfsg2/src/z88com.c:470:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Aufbereitete Strukturdaten Z88O0.TXT editieren"); data/z88-13.0.0+dfsg2/src/z88com.c:471:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Edit Processed Input Data Z88O0.TXT for documentation"); data/z88-13.0.0+dfsg2/src/z88com.c:477:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Aufbereitete Randbedingungen Z88O1.TXT editieren"); data/z88-13.0.0+dfsg2/src/z88com.c:478:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Edit Processed Boundary Conditions Z88O1.TXT for documentation"); data/z88-13.0.0+dfsg2/src/z88com.c:484:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Berechnete Verschiebungen Z88O2.TXT editieren"); data/z88-13.0.0+dfsg2/src/z88com.c:485:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Edit Computed Displacements Z88O2.TXT"); data/z88-13.0.0+dfsg2/src/z88com.c:491:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Berechnete Spannungen Z88O3.TXT editieren"); data/z88-13.0.0+dfsg2/src/z88com.c:492:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Edit Computed Stresses Z88O3.TXT"); data/z88-13.0.0+dfsg2/src/z88com.c:498:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Berechnete Knotenkraefte Z88O4.TXT editieren"); data/z88-13.0.0+dfsg2/src/z88com.c:499:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Edit Computed Nodal Forces Z88O4.TXT"); data/z88-13.0.0+dfsg2/src/z88d.c:137:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cdyn[8] = "z88.dyn"; data/z88-13.0.0+dfsg2/src/z88d.c:138:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char clgd[9] = "z88d.log"; data/z88-13.0.0+dfsg2/src/z88d.c:139:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c1y[10] = "z88o1.bny"; data/z88-13.0.0+dfsg2/src/z88d.c:140:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c3y[10] = "z88o3.bny"; data/z88-13.0.0+dfsg2/src/z88d.c:141:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char co3[10] = "z88o3.txt"; data/z88-13.0.0+dfsg2/src/z88d.c:142:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ci3[10] = "z88i3.txt"; data/z88-13.0.0+dfsg2/src/z88d.c:143:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char co5[10] = "z88o5.txt"; data/z88-13.0.0+dfsg2/src/z88d.c:144:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char co8[10] = "z88o8.txt"; data/z88-13.0.0+dfsg2/src/z88d.c:200:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/z88d.c:246:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fi3= fopen(ci3,"r"); data/z88-13.0.0+dfsg2/src/z88d.c:256:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fo3= fopen(co3,"w+"); data/z88-13.0.0+dfsg2/src/z88d.c:266:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fo5= fopen(co5,"w+"); data/z88-13.0.0+dfsg2/src/z88d.c:276:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fo8= fopen(co8,"w+"); data/z88-13.0.0+dfsg2/src/z88e.c:124:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cdyn[8] = "z88.dyn"; data/z88-13.0.0+dfsg2/src/z88e.c:125:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char clgd[9] = "z88e.log"; data/z88-13.0.0+dfsg2/src/z88e.c:126:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c1y[10] = "z88o1.bny"; data/z88-13.0.0+dfsg2/src/z88e.c:127:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c3y[10] = "z88o3.bny"; data/z88-13.0.0+dfsg2/src/z88e.c:128:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char co4[10] = "z88o4.txt"; data/z88-13.0.0+dfsg2/src/z88e.c:242:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fo4= fopen(co4,"w+"); data/z88-13.0.0+dfsg2/src/z88f.c:86:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cdyn[8] = "z88.dyn"; data/z88-13.0.0+dfsg2/src/z88f.c:87:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char clgd[9] = "z88f.log"; data/z88-13.0.0+dfsg2/src/z88f.c:88:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ci1[10] = "z88i1.txt"; data/z88-13.0.0+dfsg2/src/z88f.c:89:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ci2[10] = "z88i2.txt"; data/z88-13.0.0+dfsg2/src/z88f.c:90:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ci5[10] = "z88i5.txt"; data/z88-13.0.0+dfsg2/src/z88f.c:91:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c1y[10] = "z88o1.bny"; data/z88-13.0.0+dfsg2/src/z88f.c:92:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c3y[10] = "z88o3.bny"; data/z88-13.0.0+dfsg2/src/z88f.c:93:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char co0[10] = "z88o0.txt"; data/z88-13.0.0+dfsg2/src/z88f.c:94:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char co1[10] = "z88o1.txt"; data/z88-13.0.0+dfsg2/src/z88f.c:95:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char co2[10] = "z88o2.txt"; data/z88-13.0.0+dfsg2/src/z88f.c:177:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cflag[10],cflagul[10]; data/z88-13.0.0+dfsg2/src/z88fx.c:123:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256],ctext[256],cfese[10]; data/z88-13.0.0+dfsg2/src/z88fx.c:153:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdxf= fopen(cxx,"r"); data/z88-13.0.0+dfsg2/src/z88fx.c:427:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cfese,"SE "); data/z88-13.0.0+dfsg2/src/z88fx.c:429:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cfese,"FE "); data/z88-13.0.0+dfsg2/src/z88g.c:90:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cdyn[8] = "z88.dyn"; data/z88-13.0.0+dfsg2/src/z88g.c:91:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char clgd[9] = "z88g.log"; data/z88-13.0.0+dfsg2/src/z88g.c:92:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ccos[9] = "z88g.cos"; data/z88-13.0.0+dfsg2/src/z88g.c:93:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cnas[9] = "z88g.nas"; data/z88-13.0.0+dfsg2/src/z88g.c:94:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cin[8] = "z88g.in"; data/z88-13.0.0+dfsg2/src/z88g.c:95:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ci1[10] = "z88i1.txt"; data/z88-13.0.0+dfsg2/src/z88g.c:96:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ci2[10] = "z88i2.txt"; data/z88-13.0.0+dfsg2/src/z88g.c:97:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ci3[10] = "z88i3.txt"; data/z88-13.0.0+dfsg2/src/z88g.c:98:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ci5[10] = "z88i5.txt"; data/z88-13.0.0+dfsg2/src/z88h.c:62:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cdyn[8] = "z88.dyn"; data/z88-13.0.0+dfsg2/src/z88h.c:63:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char clgd[9] = "z88h.log"; data/z88-13.0.0+dfsg2/src/z88h.c:145:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[255]; data/z88-13.0.0+dfsg2/src/z88h.c:152:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fcut=fopen(cfcut,"w"))==NULL) data/z88-13.0.0+dfsg2/src/z88h.c:162:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fz88i1=fopen(cfi1,"r"))==NULL) data/z88-13.0.0+dfsg2/src/z88h.c:483:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[255]; data/z88-13.0.0+dfsg2/src/z88h.c:488:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fpermdat=fopen(cpermdat,"w"))==NULL) data/z88-13.0.0+dfsg2/src/z88h.c:498:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fcut=fopen(cutfile,"r"))==NULL) data/z88-13.0.0+dfsg2/src/z88h.c:884:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[255]; data/z88-13.0.0+dfsg2/src/z88h.c:897:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fz88i1old= fopen(cz88i1old,"r")) != NULL) data/z88-13.0.0+dfsg2/src/z88h.c:903:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fz88i2old= fopen(cz88i2old,"r")) != NULL) data/z88-13.0.0+dfsg2/src/z88h.c:911:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fz88i5old= fopen(cz88i5old,"r")) != NULL) data/z88-13.0.0+dfsg2/src/z88h.c:922:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fpermdat= fopen(cpermdat,"r"); data/z88-13.0.0+dfsg2/src/z88h.c:924:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fz88i1old= fopen(cz88i1old,"r"); data/z88-13.0.0+dfsg2/src/z88h.c:925:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fz88i2old= fopen(cz88i2old,"r"); data/z88-13.0.0+dfsg2/src/z88h.c:926:28: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if(iqflag == 1) fz88i5old= fopen(cz88i5old,"r"); data/z88-13.0.0+dfsg2/src/z88h.c:928:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fz88i1= fopen(cz88i1,"w"); data/z88-13.0.0+dfsg2/src/z88h.c:929:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fz88i2= fopen(cz88i2,"w"); data/z88-13.0.0+dfsg2/src/z88h.c:930:28: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if(iqflag == 1) fz88i5= fopen(cz88i5,"w"); data/z88-13.0.0+dfsg2/src/z88i1.c:81:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cdyn[8] = "z88.dyn"; data/z88-13.0.0+dfsg2/src/z88i1.c:82:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cl1[10] = "z88i1.log"; data/z88-13.0.0+dfsg2/src/z88i1.c:83:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ci1[10] = "z88i1.txt"; data/z88-13.0.0+dfsg2/src/z88i1.c:84:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c1y[10] = "z88o1.bny"; data/z88-13.0.0+dfsg2/src/z88i1.c:85:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c4y[10] = "z88o4.bny"; data/z88-13.0.0+dfsg2/src/z88i1.c:86:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char co0[10] = "z88o0.txt"; data/z88-13.0.0+dfsg2/src/z88i1.c:87:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char co1[10] = "z88o1.txt"; data/z88-13.0.0+dfsg2/src/z88i2.c:86:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cdyn[8] = "z88.dyn"; data/z88-13.0.0+dfsg2/src/z88i2.c:87:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cl2[10] = "z88i2.log"; data/z88-13.0.0+dfsg2/src/z88i2.c:88:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ci2[10] = "z88i2.txt"; data/z88-13.0.0+dfsg2/src/z88i2.c:89:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ci4[10] = "z88i4.txt"; data/z88-13.0.0+dfsg2/src/z88i2.c:90:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ci5[10] = "z88i5.txt"; data/z88-13.0.0+dfsg2/src/z88i2.c:91:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c1y[10] = "z88o1.bny"; data/z88-13.0.0+dfsg2/src/z88i2.c:92:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c3y[10] = "z88o3.bny"; data/z88-13.0.0+dfsg2/src/z88i2.c:93:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c4y[10] = "z88o4.bny"; data/z88-13.0.0+dfsg2/src/z88i2.c:94:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char co1[10] = "z88o1.txt"; data/z88-13.0.0+dfsg2/src/z88i2.c:95:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char co2[10] = "z88o2.txt"; data/z88-13.0.0+dfsg2/src/z88i2.c:186:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cflag[10],cflagul[10]; data/z88-13.0.0+dfsg2/src/z88n.c:80:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cdyn[8] = "z88.dyn"; data/z88-13.0.0+dfsg2/src/z88n.c:81:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char clgd[9] = "z88n.log"; data/z88-13.0.0+dfsg2/src/z88n.c:82:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cni[10] = "z88ni.txt"; data/z88-13.0.0+dfsg2/src/z88n.c:83:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ci1[10] = "z88i1.txt"; data/z88-13.0.0+dfsg2/src/z88o.c:150:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char CF_GRAFICS[128]; data/z88-13.0.0+dfsg2/src/z88o.c:306:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cline[256]; data/z88-13.0.0+dfsg2/src/z88o.c:308:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cdyn[8] = "z88.dyn"; data/z88-13.0.0+dfsg2/src/z88o.c:309:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char clgd[12] = "z88o.log"; data/z88-13.0.0+dfsg2/src/z88o.c:310:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstrn[128]= "z88i1.txt"; data/z88-13.0.0+dfsg2/src/z88o.c:311:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ci2[10] = "z88i2.txt"; data/z88-13.0.0+dfsg2/src/z88o.c:312:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ci5[10] = "z88i5.txt"; data/z88-13.0.0+dfsg2/src/z88o.c:313:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char co2[10] = "z88o2.txt"; data/z88-13.0.0+dfsg2/src/z88o.c:314:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char co5[10] = "z88o5.txt"; data/z88-13.0.0+dfsg2/src/z88o.c:315:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char co8[10] = "z88o8.txt"; data/z88-13.0.0+dfsg2/src/z88o.c:317:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char CBROWSER[128],CPREFIX[128]; data/z88-13.0.0+dfsg2/src/z88o.c:318:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char CPANGO_FONT[64],CPANGO_SIZE[32]; data/z88-13.0.0+dfsg2/src/z88o.c:320:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cfname[256]; data/z88-13.0.0+dfsg2/src/z88o.c:321:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ctname[256]; data/z88-13.0.0+dfsg2/src/z88o.c:326:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstore[256]; data/z88-13.0.0+dfsg2/src/z88o.c:327:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cbcall[128]; data/z88-13.0.0+dfsg2/src/z88o.c:328:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cbpref[128]; data/z88-13.0.0+dfsg2/src/z88o.c:329:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cbhelp[512]; data/z88-13.0.0+dfsg2/src/z88o.c:330:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmess [512]; data/z88-13.0.0+dfsg2/src/z88o.c:331:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cbytes[128]; data/z88-13.0.0+dfsg2/src/z88o.c:362:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cstring[256]; data/z88-13.0.0+dfsg2/src/z88o.c:465:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Info"); data/z88-13.0.0+dfsg2/src/z88o.c:466:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"About"); data/z88-13.0.0+dfsg2/src/z88o.c:470:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Hilfe"); data/z88-13.0.0+dfsg2/src/z88o.c:471:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Help"); data/z88-13.0.0+dfsg2/src/z88o.c:476:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Ende"); data/z88-13.0.0+dfsg2/src/z88o.c:477:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Quit"); data/z88-13.0.0+dfsg2/src/z88o.c:483:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Datei"); data/z88-13.0.0+dfsg2/src/z88o.c:484:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"File"); data/z88-13.0.0+dfsg2/src/z88o.c:488:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Strukturfile angeben,Z88I1.TXT ist Default"); data/z88-13.0.0+dfsg2/src/z88o.c:489:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Choose Structure File,Z88I1.TXT is Default"); data/z88-13.0.0+dfsg2/src/z88o.c:495:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Autoskalieren - Struktur einpassen"); data/z88-13.0.0+dfsg2/src/z88o.c:496:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"AutoScale - fit structure"); data/z88-13.0.0+dfsg2/src/z88o.c:499:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"* Tastatur / Maus"); data/z88-13.0.0+dfsg2/src/z88o.c:500:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"* Keyboard / Mouse"); data/z88-13.0.0+dfsg2/src/z88o.c:504:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Zoom-Schieben-Rotieren ueber Tastatur oder Maus"); data/z88-13.0.0+dfsg2/src/z88o.c:505:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Zoom-Pan-Rotate via Keyboard or Mouse"); data/z88-13.0.0+dfsg2/src/z88o.c:510:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"* unverformt"); data/z88-13.0.0+dfsg2/src/z88o.c:511:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"* undeflected"); data/z88-13.0.0+dfsg2/src/z88o.c:515:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Zeige unverformte Struktur"); data/z88-13.0.0+dfsg2/src/z88o.c:516:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Show undeflected Structure"); data/z88-13.0.0+dfsg2/src/z88o.c:519:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"verformt"); data/z88-13.0.0+dfsg2/src/z88o.c:520:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"deflected"); data/z88-13.0.0+dfsg2/src/z88o.c:524:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Zeige verformte Struktur"); data/z88-13.0.0+dfsg2/src/z88o.c:525:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Show deflected Structure"); data/z88-13.0.0+dfsg2/src/z88o.c:530:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"* Licht"); data/z88-13.0.0+dfsg2/src/z88o.c:531:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"* Light"); data/z88-13.0.0+dfsg2/src/z88o.c:535:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Licht an, auf Wunsch Anzeige der Randbedingungen"); data/z88-13.0.0+dfsg2/src/z88o.c:536:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Light on, show Boundary Conditions on request"); data/z88-13.0.0+dfsg2/src/z88o.c:542:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verdeckte Linien (nur 3D), auf Wunsch Anzeige der Randbedingungen"); data/z88-13.0.0+dfsg2/src/z88o.c:543:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Hidden Line (3D only), show Boundary Conditions on request"); data/z88-13.0.0+dfsg2/src/z88o.c:549:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Wireframe, auf Wunsch Anzeige der Randbedingungen"); data/z88-13.0.0+dfsg2/src/z88o.c:550:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Wireframe, show Boundary Conditions on request"); data/z88-13.0.0+dfsg2/src/z88o.c:553:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen Eckknoten"); data/z88-13.0.0+dfsg2/src/z88o.c:554:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses Corner Nodes"); data/z88-13.0.0+dfsg2/src/z88o.c:558:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Vergleichsspannungen (GEH,NH,SH: abhaengig von Z88D) in den Eckknoten"); data/z88-13.0.0+dfsg2/src/z88o.c:559:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Reduced Stresses (v.Mises,Rankine,Tresca:depending from Z88D) in corner nodes"); data/z88-13.0.0+dfsg2/src/z88o.c:562:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen pro Element"); data/z88-13.0.0+dfsg2/src/z88o.c:563:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses per Element"); data/z88-13.0.0+dfsg2/src/z88o.c:567:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Vergleichsspannungen (GEH,NH,SH: abhaengig von Z88D) pro Element gemittelt"); data/z88-13.0.0+dfsg2/src/z88o.c:568:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Reduced Stresses (v.Mises,Rankine,Tresca:depending from Z88D),mean values per Element"); data/z88-13.0.0+dfsg2/src/z88o.c:571:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Spannungen Gausspunkte"); data/z88-13.0.0+dfsg2/src/z88o.c:572:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Stresses Gauss Points"); data/z88-13.0.0+dfsg2/src/z88o.c:576:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Vergleichsspannungen (GEH,NH,SH: abhaengig von Z88D) -nur unverformte Struktur- in den Gausspunkten"); data/z88-13.0.0+dfsg2/src/z88o.c:577:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Reduced Stresses (v.Mises,Rankine,Tresca:depending from Z88D) -undeflected Structure only- in Gauss Points"); data/z88-13.0.0+dfsg2/src/z88o.c:580:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen X"); data/z88-13.0.0+dfsg2/src/z88o.c:581:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections X"); data/z88-13.0.0+dfsg2/src/z88o.c:585:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Zeige X-Verschiebungen"); data/z88-13.0.0+dfsg2/src/z88o.c:586:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Show X Displacements"); data/z88-13.0.0+dfsg2/src/z88o.c:589:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen Y"); data/z88-13.0.0+dfsg2/src/z88o.c:590:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections Y"); data/z88-13.0.0+dfsg2/src/z88o.c:594:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Zeige Y-Verschiebungen"); data/z88-13.0.0+dfsg2/src/z88o.c:595:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Show Y Displacements"); data/z88-13.0.0+dfsg2/src/z88o.c:598:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen Z"); data/z88-13.0.0+dfsg2/src/z88o.c:599:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections Z"); data/z88-13.0.0+dfsg2/src/z88o.c:603:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Zeige Z-Verschiebungen"); data/z88-13.0.0+dfsg2/src/z88o.c:604:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Show Z Displacements"); data/z88-13.0.0+dfsg2/src/z88o.c:609:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Zeige die Randbedingungen"); data/z88-13.0.0+dfsg2/src/z88o.c:610:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Show Boundary Conditions"); data/z88-13.0.0+dfsg2/src/z88o.c:614:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Zeige Randbedingungen ja/nein (nur Licht/Hidden Line/Wireframe)"); data/z88-13.0.0+dfsg2/src/z88o.c:615:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Show Boundary Conditions yes/no (Light/hidden Line/Wireframe only)"); data/z88-13.0.0+dfsg2/src/z88o.c:618:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Zeige Koordinatensystem"); data/z88-13.0.0+dfsg2/src/z88o.c:619:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Show Coordinate System"); data/z88-13.0.0+dfsg2/src/z88o.c:623:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Zeige Koordinatensystem ja/nein"); data/z88-13.0.0+dfsg2/src/z88o.c:624:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Show Coordinate System yes/no"); data/z88-13.0.0+dfsg2/src/z88o.c:672:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"keine Labels"); data/z88-13.0.0+dfsg2/src/z88o.c:673:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"No Labels"); data/z88-13.0.0+dfsg2/src/z88o.c:677:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Knoten"); data/z88-13.0.0+dfsg2/src/z88o.c:678:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Nodes"); data/z88-13.0.0+dfsg2/src/z88o.c:682:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Elemente"); data/z88-13.0.0+dfsg2/src/z88o.c:683:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Elements"); data/z88-13.0.0+dfsg2/src/z88o.c:687:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Alles labeln"); data/z88-13.0.0+dfsg2/src/z88o.c:688:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Label all"); data/z88-13.0.0+dfsg2/src/z88o.c:700:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Faktoren"); data/z88-13.0.0+dfsg2/src/z88o.c:701:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Factors"); data/z88-13.0.0+dfsg2/src/z88o.c:708:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Verschiebungen"); data/z88-13.0.0+dfsg2/src/z88o.c:709:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Deflections"); data/z88-13.0.0+dfsg2/src/z88o.c:713:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Rotationen 3D"); data/z88-13.0.0+dfsg2/src/z88o.c:714:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Rotations 3D"); data/z88-13.0.0+dfsg2/src/z88o.c:718:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Z-Limit zum Betrachter"); data/z88-13.0.0+dfsg2/src/z88o.c:719:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Z limit towards you"); data/z88-13.0.0+dfsg2/src/z88o.c:730:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Randbedingungen"); data/z88-13.0.0+dfsg2/src/z88o.c:731:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Boundary Conditions"); data/z88-13.0.0+dfsg2/src/z88o.c:738:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"RB nicht zeigen"); data/z88-13.0.0+dfsg2/src/z88o.c:739:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Don't show BCs"); data/z88-13.0.0+dfsg2/src/z88o.c:743:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"RB zeigen"); data/z88-13.0.0+dfsg2/src/z88o.c:744:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Show BCs"); data/z88-13.0.0+dfsg2/src/z88o.c:754:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"nur einzelne RB zeigen"); data/z88-13.0.0+dfsg2/src/z88o.c:755:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Only show single BC"); data/z88-13.0.0+dfsg2/src/z88o.c:770:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"alle RB"); data/z88-13.0.0+dfsg2/src/z88o.c:771:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"all the BCs"); data/z88-13.0.0+dfsg2/src/z88o.c:775:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"nur U1=UX=0"); data/z88-13.0.0+dfsg2/src/z88o.c:776:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"only U1=UX=0"); data/z88-13.0.0+dfsg2/src/z88o.c:780:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"nur U2=UY=0"); data/z88-13.0.0+dfsg2/src/z88o.c:781:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"only U2=UY=0"); data/z88-13.0.0+dfsg2/src/z88o.c:785:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"nur U3=UZ=0"); data/z88-13.0.0+dfsg2/src/z88o.c:786:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"only U3=UZ=0"); data/z88-13.0.0+dfsg2/src/z88o.c:790:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"nur U4=RotX=0"); data/z88-13.0.0+dfsg2/src/z88o.c:791:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"only U4=RotX=0"); data/z88-13.0.0+dfsg2/src/z88o.c:795:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"nur U5=RotY=0"); data/z88-13.0.0+dfsg2/src/z88o.c:796:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"only U5=RotY=0"); data/z88-13.0.0+dfsg2/src/z88o.c:800:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"nur U6=RotZ=0"); data/z88-13.0.0+dfsg2/src/z88o.c:801:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"only U6=RotZ=0"); data/z88-13.0.0+dfsg2/src/z88o.c:805:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"nur U vorgegeben"); data/z88-13.0.0+dfsg2/src/z88o.c:806:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"only U given"); data/z88-13.0.0+dfsg2/src/z88o.c:810:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"nur Oberflaechenlasten"); data/z88-13.0.0+dfsg2/src/z88o.c:811:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"only Surface Loads"); data/z88-13.0.0+dfsg2/src/z88o.c:815:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"nur Kraefte X"); data/z88-13.0.0+dfsg2/src/z88o.c:816:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"only Forces X"); data/z88-13.0.0+dfsg2/src/z88o.c:820:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"nur Kraefte Y"); data/z88-13.0.0+dfsg2/src/z88o.c:821:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"only Forces Y"); data/z88-13.0.0+dfsg2/src/z88o.c:825:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"nur Kraefte Z"); data/z88-13.0.0+dfsg2/src/z88o.c:826:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"only Forces Z"); data/z88-13.0.0+dfsg2/src/z88o.c:846:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Groesse Gausspt."); data/z88-13.0.0+dfsg2/src/z88o.c:847:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Size Gausspt."); data/z88-13.0.0+dfsg2/src/z88o.c:866:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Netz ueber Spannungen"); data/z88-13.0.0+dfsg2/src/z88o.c:867:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Mesh over Stresses"); data/z88-13.0.0+dfsg2/src/z88o.c:874:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Netz ueber Spannungen nein"); data/z88-13.0.0+dfsg2/src/z88o.c:875:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Mesh over Stresses no"); data/z88-13.0.0+dfsg2/src/z88o.c:879:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 1) strcpy(cstring,"Netz ueber Spannungen ja"); data/z88-13.0.0+dfsg2/src/z88o.c:880:15: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if(LANG == 2) strcpy(cstring,"Mesh over Stresses yes"); data/z88-13.0.0+dfsg2/src/z88tx.c:160:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdxf= fopen(cxx,"w"); data/z88-13.0.0+dfsg2/src/z88v.c:84:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cdyn[8] = "z88.dyn"; data/z88-13.0.0+dfsg2/src/z88v.c:85:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char clgd[9] = "z88v.log"; data/z88-13.0.0+dfsg2/src/z88v.c:105:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cdatei[10]; data/z88-13.0.0+dfsg2/src/z88v.c:196:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cdatei,"z88ni.txt"); data/z88-13.0.0+dfsg2/src/z88v.c:197:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdatei= fopen(cdatei,"r"); data/z88-13.0.0+dfsg2/src/z88v.c:203:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cdatei,"z88i1.txt"); data/z88-13.0.0+dfsg2/src/z88v.c:204:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdatei= fopen(cdatei,"r"); data/z88-13.0.0+dfsg2/src/z88v.c:209:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cdatei,"z88i2.txt"); data/z88-13.0.0+dfsg2/src/z88v.c:210:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdatei= fopen(cdatei,"r"); data/z88-13.0.0+dfsg2/src/z88v.c:215:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cdatei,"z88i3.txt"); data/z88-13.0.0+dfsg2/src/z88v.c:216:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdatei= fopen(cdatei,"r"); data/z88-13.0.0+dfsg2/src/z88v.c:221:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cdatei,"z88i4.txt"); data/z88-13.0.0+dfsg2/src/z88v.c:222:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdatei= fopen(cdatei,"r"); data/z88-13.0.0+dfsg2/src/z88v.c:227:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cdatei,"z88.dyn"); data/z88-13.0.0+dfsg2/src/z88v.c:231:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(cdatei,"z88i5.txt"); data/z88-13.0.0+dfsg2/src/z88v.c:232:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fdatei= fopen(cdatei,"r"); data/z88-13.0.0+dfsg2/src/z88x.c:86:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cdyn[8] = "z88.dyn"; data/z88-13.0.0+dfsg2/src/z88x.c:87:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char clgd[9] = "z88x.log"; data/z88-13.0.0+dfsg2/src/z88x.c:88:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ci1[10] = "z88i1.txt"; data/z88-13.0.0+dfsg2/src/z88x.c:89:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ci2[10] = "z88i2.txt"; data/z88-13.0.0+dfsg2/src/z88x.c:90:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ci3[10] = "z88i3.txt"; data/z88-13.0.0+dfsg2/src/z88x.c:91:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ci5[10] = "z88i5.txt"; data/z88-13.0.0+dfsg2/src/z88x.c:92:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cni[10] = "z88ni.txt"; data/z88-13.0.0+dfsg2/src/z88x.c:93:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cxx[10] = "z88x.dxf"; data/z88-13.0.0+dfsg2/src/z88x.c:150:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cflag[10]; data/z88-13.0.0+dfsg2/src/z88x.c:164:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cflagul[10], cftexts[10], cfts[10]; data/z88-13.0.0+dfsg2/src/cb88c.c:75:1: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:183:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:211:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:239:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:267:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:295:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:323:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:351:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:381:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:421:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:451:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:481:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:511:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:541:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:571:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:601:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:631:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:661:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:691:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:721:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:751:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:779:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:807:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:835:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:863:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:891:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:919:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:947:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:975:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:1003:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:1031:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:1059:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88c.c:1087:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/cb88o.c:398:1: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(command," "); data/z88-13.0.0+dfsg2/src/dnas88.c:145:11: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while((i= fgetc(fpro)) != EOF) data/z88-13.0.0+dfsg2/src/m15.c:87:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:94:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:101:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:108:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:115:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:122:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:129:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:136:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:143:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:150:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:157:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:171:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:180:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:188:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:196:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:206:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:215:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:224:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:268:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:339:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:363:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:393:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:427:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:462:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:490:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:518:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:578:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:623:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:688:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:761:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:769:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:777:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:785:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:793:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:801:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:809:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:817:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:825:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:833:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/m15.c:841:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glCallLists(strlen(cstring),GL_UNSIGNED_BYTE,cstring); data/z88-13.0.0+dfsg2/src/nast88.c:145:11: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while((i= fgetc(fpro)) != EOF) data/z88-13.0.0+dfsg2/src/z88o.c:394:1: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(CF_GRAFICS," "); ANALYSIS SUMMARY: Hits = 1639 Lines analyzed = 73878 in approximately 2.88 seconds (25633 lines/second) Physical Source Lines of Code (SLOC) = 45338 Hits@level = [0] 4061 [1] 77 [2] 1011 [3] 0 [4] 551 [5] 0 Hits@level+ = [0+] 5700 [1+] 1639 [2+] 1562 [3+] 551 [4+] 551 [5+] 0 Hits/KSLOC@level+ = [0+] 125.722 [1+] 36.1507 [2+] 34.4523 [3+] 12.1532 [4+] 12.1532 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.