Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxnix/sigcommon.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxnix/daemon.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxnix/coredump.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxnix/control.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxnix/control.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxnix/fatal.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxnix/pid.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxnix/dshm.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxnix/fatal.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxnix/sighandler.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxnix/ipc.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxregexp/zbxregexp.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsys/threads.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsys/symbols.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsys/mutexs.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig_dump.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig_maintenance.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/valuecache.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/valuecache.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/itservices.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/lld_macro.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/event.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/maintenance.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/discovery.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/dbschema.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/item.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/trigger.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json_parser.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json_parser.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdiag/diag.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdiag/diag_proxy.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdiag/diag_server.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdiag/diag.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcompress/compress.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxmodules/modules.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxembed/httprequest.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxembed/embed.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxembed/global.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxembed/embed.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxembed/httprequest.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxembed/global.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxembed/zabbix.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxembed/zabbix.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxhttp/punycode.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxhttp/urlencode.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxhttp/punycode.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxhttp/http.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxmemory/memalloc.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxself/selfmon.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls_version.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/base64.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls_tcp_active.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls_tcp.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/md5.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_sql.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_elastic.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/iprange.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/alias.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/xml.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/comms.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant_misc.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/setproctitle.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/file.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/zbxgetopt.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxserver/zabbix_stats_server.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxserver/zabbix_stats.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxserver/evalfunc.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxserver/evalfunc.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxserver/macrofunc.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxserver/macrofunc.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxserver/zabbix_stats_proxy.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxserver/zabbix_stats.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/disk.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/service.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/fatal.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4000.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2030.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4020.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2020.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4040.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4030.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3000.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4010.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3030.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3050.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2010.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_5000.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3040.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3020.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4050.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2050.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2040.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/telnet.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxcommshigh/comms.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/swap.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/proc.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/diskspace.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/memory.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/inodes.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/software.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/vmstats.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/inodes.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/system.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/aix.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/cpu.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/hostname.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/diskio.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/net.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/uptime.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/proc.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/kernel.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/diskspace.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/memory.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/inodes.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/software.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/inodes.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/system.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/boottime.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/cpu.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/netbsd.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/hostname.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/diskio.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/net.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/netbsd/uptime.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/swap.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/proc.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/services.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskspace.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/memory.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/software.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/system.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/pdhmon.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/cpu.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/wmi.cpp
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/hostname.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskio.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/win32.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/net.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/uptime.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/swap.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/proc.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/kernel.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/diskspace.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/memory.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/inodes.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/software.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/inodes.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/system.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/boottime.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/sensors.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/openbsd.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/cpu.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/hostname.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/diskio.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/net.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/uptime.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/kernel.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskspace.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/memory.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/inodes.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/software.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/inodes.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/system.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/boottime.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/linux.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/cpu.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hostname.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/software.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/uptime.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/simple/ntp.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/simple/ntp.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/simple/simple.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/simple/simple.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/common.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/zabbix_stats.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/file.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dir.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/system.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/common.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/http.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dir.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/cpu.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/system.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/http.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/cpu.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/file.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/net.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/zabbix_stats.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/net.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/proc.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/diskspace.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/memory.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/inodes.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/software.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/hpux.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/inodes.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/system.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/cpu.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/hostname.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/diskio.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/net.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/swap.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/kernel.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/diskspace.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/memory.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/inodes.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/software.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/inodes.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/system.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/boottime.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/cpu.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/solaris.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/hostname.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/diskio.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/net.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/uptime.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/swap.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/proc.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/kernel.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/diskspace.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/memory.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/software.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/inodes.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/system.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/cpu.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/hostname.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/diskio.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/osf.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/uptime.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/specsysinfo.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/swap.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/proc.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/kernel.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/diskspace.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/memory.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/inodes.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/software.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/inodes.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/system.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/boottime.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/cpu.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/hostname.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/freebsd.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/diskio.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/net.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/uptime.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/kernel.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/diskspace.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/memory.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/inodes.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/software.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/inodes.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/osx.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/system.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/boottime.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/cpu.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/hostname.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/diskio.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/net.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/uptime.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/unknown/hostname.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/unknown/diskio.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/unknown/unknown.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/agent/agent.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/agent/agent.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxconf/cfg.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/vectorimpl.h
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/hashset.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/queue.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/vector.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/evaluate.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/prediction.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/int128.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/algodefs.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/hashmap.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/binaryheap.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxexec/execute.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/sms.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c
Examining data/zabbix-5.0.5+dfsg/src/libs/zbxprometheus/zbxprometheus.c
Examining data/zabbix-5.0.5+dfsg/src/modules/dummy/dummy.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/events.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/pinger/pinger.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/pinger/pinger.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/server.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/taskmanager.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/taskmanager.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/proxy_tasks.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/selfmon/selfmon.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/selfmon/selfmon.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/odbc/odbc.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/odbc/odbc.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/proxydata.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/proxydata.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/proxyconfig.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_preproc.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_expressions_evaluate.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_item_test.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_item_test.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/active.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_preproc.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/proxyconfig.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_expressions_evaluate.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/active.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/nodecommand.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/nodecommand.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_manager.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_worker.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_trigger.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_protocol.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_common.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_manager.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_protocol.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_worker.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_protocol.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_protocol.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_poller.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_manager.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_poller.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_manager.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httppoller.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httpmacro.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httpmacro.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httppoller.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/snmptrapper/snmptrapper.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/snmptrapper/snmptrapper.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/dbsyncer/dbsyncer.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/dbsyncer/dbsyncer.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_ssh.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_internal_proxy.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_aggregate.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/poller.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_agent.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_simple_vmware.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_external.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_aggregate.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_simple.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/poller.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_internal.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_http.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_db.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_telnet.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_agent.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_simple.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_telnet.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_simple_vmware.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_ssh.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_internal.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_calculated.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_internal_server.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_http.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_external.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_calculated.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_db.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_java.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_java.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/timer/timer.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/timer/timer.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_syncer.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alerter.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alerter_protocol.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alerter_protocol.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_manager.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_syncer.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_manager.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alerter.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/scripts/scripts.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/scripts/scripts.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/proxypoller/proxypoller.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/proxypoller/proxypoller.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/events.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/housekeeper.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/history_compress.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/history_compress.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/housekeeper.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/dbconfig/dbconfig.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/dbconfig/dbconfig.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_worker.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_worker.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_manager.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_history.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_manager.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preprocessing.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preprocessing.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/linked_list.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_history.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/linked_list.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/vmstats.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/zbxkstat.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/listener.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/stats.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/zbxconf.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/zbxconf.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/vmstats.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/diskdevices.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/active.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/zbxkstat.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/zabbix_agentd.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/active.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/stats.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/eventlog.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/eventlog.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/metrics.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/cpustat.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/cpustat.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/listener.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_agent/diskdevices.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_js/zabbix_js.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_get/zabbix_get.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/servercomms.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/taskmanager.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/server_tasks.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/taskmanager.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/datasender/datasender.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/datasender/datasender.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/proxyconfig/proxyconfig.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/proxyconfig/proxyconfig.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/servercomms.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/proxy_alerter_protocol.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/proxy_lld.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/proxy.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/events.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/heart/heart.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/heart/heart.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/housekeeper/housekeeper.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_proxy/housekeeper/housekeeper.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_sender/win32/zabbix_sender.h
Examining data/zabbix-5.0.5+dfsg/src/zabbix_sender/win32/zabbix_sender.c
Examining data/zabbix-5.0.5+dfsg/src/zabbix_sender/zabbix_sender.c
Examining data/zabbix-5.0.5+dfsg/build/mingw/winmeta.h
Examining data/zabbix-5.0.5+dfsg/build/win32/examples/zabbix_sender/sender.c
Examining data/zabbix-5.0.5+dfsg/build/win32/include/config.h
Examining data/zabbix-5.0.5+dfsg/build/win32/project/zabbix_sender_desc.h
Examining data/zabbix-5.0.5+dfsg/build/win32/project/zabbix_agent2_desc.h
Examining data/zabbix-5.0.5+dfsg/build/win32/project/zabbix_agent_desc.h
Examining data/zabbix-5.0.5+dfsg/build/win32/project/zabbix_get_desc.h
Examining data/zabbix-5.0.5+dfsg/build/win32/project/resource.h
Examining data/zabbix-5.0.5+dfsg/bin/win32/dev/zabbix_sender.h
Examining data/zabbix-5.0.5+dfsg/bin/win64/dev/zabbix_sender.h
Examining data/zabbix-5.0.5+dfsg/include/common.h
Examining data/zabbix-5.0.5+dfsg/include/log.h
Examining data/zabbix-5.0.5+dfsg/include/zbxdb.h
Examining data/zabbix-5.0.5+dfsg/include/perfmon.h
Examining data/zabbix-5.0.5+dfsg/include/service.h
Examining data/zabbix-5.0.5+dfsg/include/zbxalert.h
Examining data/zabbix-5.0.5+dfsg/include/zbxhttp.h
Examining data/zabbix-5.0.5+dfsg/include/zbxmodules.h
Examining data/zabbix-5.0.5+dfsg/include/sysinfo.h
Examining data/zabbix-5.0.5+dfsg/include/proxy.h
Examining data/zabbix-5.0.5+dfsg/include/ipc.h
Examining data/zabbix-5.0.5+dfsg/include/preproc.h
Examining data/zabbix-5.0.5+dfsg/include/zbxcompress.h
Examining data/zabbix-5.0.5+dfsg/include/zbxgetopt.h
Examining data/zabbix-5.0.5+dfsg/include/threads.h
Examining data/zabbix-5.0.5+dfsg/include/alias.h
Examining data/zabbix-5.0.5+dfsg/include/zbxembed.h
Examining data/zabbix-5.0.5+dfsg/include/module.h
Examining data/zabbix-5.0.5+dfsg/include/zbxdiag.h
Examining data/zabbix-5.0.5+dfsg/include/pid.h
Examining data/zabbix-5.0.5+dfsg/include/zbxlld.h
Examining data/zabbix-5.0.5+dfsg/include/cfg.h
Examining data/zabbix-5.0.5+dfsg/include/sighandler.h
Examining data/zabbix-5.0.5+dfsg/include/mutexs.h
Examining data/zabbix-5.0.5+dfsg/include/zbxjson.h
Examining data/zabbix-5.0.5+dfsg/include/discovery.h
Examining data/zabbix-5.0.5+dfsg/include/base64.h
Examining data/zabbix-5.0.5+dfsg/include/db.h
Examining data/zabbix-5.0.5+dfsg/include/zbxmedia.h
Examining data/zabbix-5.0.5+dfsg/include/zbxregexp.h
Examining data/zabbix-5.0.5+dfsg/include/md5.h
Examining data/zabbix-5.0.5+dfsg/include/zbxtasks.h
Examining data/zabbix-5.0.5+dfsg/include/dbcache.h
Examining data/zabbix-5.0.5+dfsg/include/memalloc.h
Examining data/zabbix-5.0.5+dfsg/include/zbxprometheus.h
Examining data/zabbix-5.0.5+dfsg/include/zbxserver.h
Examining data/zabbix-5.0.5+dfsg/include/symbols.h
Examining data/zabbix-5.0.5+dfsg/include/zbxcrypto.h
Examining data/zabbix-5.0.5+dfsg/include/zbxserialize.h
Examining data/zabbix-5.0.5+dfsg/include/zbxhistory.h
Examining data/zabbix-5.0.5+dfsg/include/export.h
Examining data/zabbix-5.0.5+dfsg/include/zbxnix.h
Examining data/zabbix-5.0.5+dfsg/include/disk.h
Examining data/zabbix-5.0.5+dfsg/include/setproctitle.h
Examining data/zabbix-5.0.5+dfsg/include/version.h
Examining data/zabbix-5.0.5+dfsg/include/dbschema.h
Examining data/zabbix-5.0.5+dfsg/include/zbxself.h
Examining data/zabbix-5.0.5+dfsg/include/comms.h
Examining data/zabbix-5.0.5+dfsg/include/telnet.h
Examining data/zabbix-5.0.5+dfsg/include/daemon.h
Examining data/zabbix-5.0.5+dfsg/include/zbxicmpping.h
Examining data/zabbix-5.0.5+dfsg/include/sysinc.h
Examining data/zabbix-5.0.5+dfsg/include/zbxalgo.h
Examining data/zabbix-5.0.5+dfsg/include/zbxdbupgrade.h
Examining data/zabbix-5.0.5+dfsg/include/zbxipcservice.h
Examining data/zabbix-5.0.5+dfsg/include/zbxtypes.h
Examining data/zabbix-5.0.5+dfsg/include/zbxexec.h

FINAL RESULTS:

data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:148:12:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
	sub_len = readlink(linkpath, subsys_path, MAX_STRING_LEN - 1);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:154:13:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
		sub_len = readlink(linkpath, subsys_path, MAX_STRING_LEN - 1);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:341:13:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
		dev_len = readlink(devicepath, deviced, MAX_STRING_LEN - 1);
data/zabbix-5.0.5+dfsg/include/common.h:42:8:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#ifdef snprintf
data/zabbix-5.0.5+dfsg/include/common.h:43:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#	undef snprintf
data/zabbix-5.0.5+dfsg/include/common.h:45:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf	ERROR_DO_NOT_USE_SNPRINTF_FUNCTION_TRY_TO_USE_ZBX_SNPRINTF
data/zabbix-5.0.5+dfsg/include/common.h:47:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#ifdef sprintf
data/zabbix-5.0.5+dfsg/include/common.h:48:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#	undef sprintf
data/zabbix-5.0.5+dfsg/include/common.h:50:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define sprintf		ERROR_DO_NOT_USE_SPRINTF_FUNCTION_TRY_TO_USE_ZBX_SNPRINTF
data/zabbix-5.0.5+dfsg/include/common.h:57:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#ifdef strcpy
data/zabbix-5.0.5+dfsg/include/common.h:58:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#	undef strcpy
data/zabbix-5.0.5+dfsg/include/common.h:60:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define strcpy		ERROR_DO_NOT_USE_STRCPY_FUNCTION_TRY_TO_USE_ZBX_STRLCPY
data/zabbix-5.0.5+dfsg/include/common.h:62:8:  [4] (buffer) vsprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#ifdef vsprintf
data/zabbix-5.0.5+dfsg/include/common.h:63:9:  [4] (buffer) vsprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#	undef vsprintf
data/zabbix-5.0.5+dfsg/include/common.h:65:9:  [4] (buffer) vsprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define vsprintf	ERROR_DO_NOT_USE_VSPRINTF_FUNCTION_TRY_TO_USE_ZBX_VSNPRINTF
data/zabbix-5.0.5+dfsg/include/zbxtypes.h:76:10:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#	define snprintf		_snprintf
data/zabbix-5.0.5+dfsg/include/zbxtypes.h:76:20:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#	define snprintf		_snprintf
data/zabbix-5.0.5+dfsg/include/zbxtypes.h:197:38:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
#define ZBX_OCT2UINT64(uint, string) sscanf(string, ZBX_FS_UO64, &uint)
data/zabbix-5.0.5+dfsg/include/zbxtypes.h:198:38:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
#define ZBX_HEX2UINT64(uint, string) sscanf(string, ZBX_FS_UX64, &uint)
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:170:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, fmt, args);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:233:16:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		*alloc_len = vsnprintf(NULL, 0, fmt, args) + 2;	/* '\0' + one byte to prevent the operation retry */
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:278:26:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		if (0 > (written_len = vsnprintf(str, count, fmt, args)))
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:741:7:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		n = vsnprintf(string, size, f, curr);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c:65:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (0 != access(CONFIG_EXPORT_DIR, W_OK | R_OK))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c:143:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (0 == access(filename_old, F_OK) && 0 != remove(filename_old))
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h:1338:26:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define DUK_SNPRINTF     snprintf
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h:1339:26:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define DUK_VSNPRINTF    vsnprintf
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h:1345:26:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define DUK_SNPRINTF     _snprintf
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h:2193:26:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define DUK_SPRINTF      sprintf
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h:2197:26:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define DUK_SNPRINTF     snprintf
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h:2200:26:  [4] (buffer) vsprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define DUK_VSPRINTF     vsprintf
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h:2204:26:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define DUK_VSNPRINTF    vsnprintf
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h:2207:26:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
#define DUK_SSCANF       sscanf
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h:2210:26:  [4] (buffer) vsscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
#define DUK_VSSCANF      vsscanf
data/zabbix-5.0.5+dfsg/src/libs/zbxexec/execute.c:200:2:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	execl("/bin/sh", "sh", "-c", command, NULL);
data/zabbix-5.0.5+dfsg/src/libs/zbxexec/execute.c:617:4:  [4] (shell) execl:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
			execl("/bin/sh", "sh", "-c", command, NULL);
data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:61:19:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	if (NULL == (f = popen(tmp, "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:306:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (-1 == access(CONFIG_FPING_LOCATION, X_OK))
data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:331:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (-1 == access(CONFIG_FPING6_LOCATION, X_OK))
data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:533:19:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	if (NULL == (f = popen(tmp, "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:1472:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (0 != access(path, W_OK | R_OK))
data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:1540:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (0 == access(socket_path, F_OK))
data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:1542:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		if (0 != access(socket_path, W_OK))
data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:400:4:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
			vfprintf(log_file, fmt, args);
data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:445:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		vfprintf(stdout, fmt, args);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/cpu.c:210:12:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		if (1 != sscanf(line, "%*s " ZBX_FS_UI64, &value))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/cpu.c:245:12:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		if (1 != sscanf(line, "%*s " ZBX_FS_UI64, &value))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c:33:26:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
#	define PARSE(line)	if (sscanf(line, ZBX_FS_UI64 ZBX_FS_UI64 " %*d %s " 		\
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c:46:26:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
#	define PARSE(line)	if (sscanf(line, ZBX_FS_UI64 ZBX_FS_UI64 " %s "			\
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c:59:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
				sscanf(line, ZBX_FS_UI64 ZBX_FS_UI64 " %s "			\
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:337:12:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		if (1 != fscanf(f, ZBX_FS_UI64, &freq))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:467:4:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
			sscanf(tmp, ZBX_FS_UI64, &curfreq);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/kernel.c:33:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
			if (1 == sscanf(line, ZBX_FS_UI64 "\n", value))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:234:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
		if (17 == sscanf(line, "%s\t" ZBX_FS_UI64 "\t" ZBX_FS_UI64 "\t"
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/software.c:93:14:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
				if (1 == sscanf(tmp_line, SW_OS_OPTION_PRETTY_NAME "=\"%[^\"]", line))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/software.c:136:11:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
	if (2 != sscanf(line, fmt, package, tmp) || 0 != strcmp(tmp, "install"))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c:108:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
			if (6 != sscanf(line, "%u %u %*s "				\
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c:171:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
			if (2 != sscanf(line + 5, ZBX_FS_UI64 " " ZBX_FS_UI64, &result->rpag, &result->wpag))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c:176:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
				sscanf(line + 7, ZBX_FS_UI64, &result->rpag);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c:181:5:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
				sscanf(line + 8, ZBX_FS_UI64, &result->wpag);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/proc.c:80:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	DWORD			access;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/proc.c:139:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			hProcess = OpenProcess(access, FALSE, pe32.th32ProcessID);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/proc.c:307:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	DWORD			access;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/proc.c:401:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			if (NULL != (hProcess = OpenProcess(access, FALSE, pe32.th32ProcessID)))
data/zabbix-5.0.5+dfsg/src/zabbix_agent/cpustat.c:452:3:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		sscanf(line, "%*s " ZBX_FS_UI64 " " ZBX_FS_UI64 " " ZBX_FS_UI64 " " ZBX_FS_UI64
data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:1709:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
			if (0 != access(directory, X_OK))
data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_manager.c:1370:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (0 == access(*cmd, X_OK))
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_external.c:63:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	if (-1 == access(cmd, X_OK))
data/zabbix-5.0.5+dfsg/src/zabbix_server/snmptrapper/snmptrapper.c:583:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		else if (0 != access(CONFIG_SNMPTRAP_FILE, R_OK))
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/zbxgetopt.c:273:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      else if (getenv ("POSIXLY_CORRECT") != NULL)
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/zbxgetopt.c:627:11:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
      c = getopt (argc, argv, "abc:d:0123456789");
data/zabbix-5.0.5+dfsg/src/libs/zbxexec/execute.c:361:11:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
	if (0 == CreateProcess(NULL, wcmd, NULL, NULL, TRUE, CREATE_SUSPENDED, NULL, NULL, &si, &pi))
data/zabbix-5.0.5+dfsg/src/libs/zbxexec/execute.c:361:11:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
	if (0 == CreateProcess(NULL, wcmd, NULL, NULL, TRUE, CREATE_SUSPENDED, NULL, NULL, &si, &pi))
data/zabbix-5.0.5+dfsg/src/libs/zbxexec/execute.c:557:11:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
	if (0 == CreateProcess(
data/zabbix-5.0.5+dfsg/src/libs/zbxexec/execute.c:557:11:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
	if (0 == CreateProcess(
data/zabbix-5.0.5+dfsg/src/modules/dummy/dummy.c:188:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(time(NULL));
data/zabbix-5.0.5+dfsg/src/zabbix_agent/eventlog.c:252:9:  [3] (misc) LoadLibraryEx:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
		res = LoadLibraryEx(dll_name, NULL, LOAD_LIBRARY_AS_DATAFILE);
data/zabbix-5.0.5+dfsg/include/common.h:38:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#		define va_copy(d, s) memcpy(&d, &s, sizeof(va_list))
data/zabbix-5.0.5+dfsg/include/common.h:82:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char ZABBIX_SERVICE_NAME[ZBX_SERVICE_NAME_LEN];
data/zabbix-5.0.5+dfsg/include/common.h:83:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char ZABBIX_EVENT_SOURCE[ZBX_SERVICE_NAME_LEN];
data/zabbix-5.0.5+dfsg/include/comms.h:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				buf_stat[ZBX_STAT_BUF_LEN];
data/zabbix-5.0.5+dfsg/include/comms.h:99:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				peer[MAX_ZBX_DNSNAME_LEN + 1];
data/zabbix-5.0.5+dfsg/include/db.h:515:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		key[ITEM_KEY_LEN * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1];
data/zabbix-5.0.5+dfsg/include/db.h:518:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		color[GRAPH_ITEM_COLOR_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ip_orig[INTERFACE_IP_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		dns_orig[INTERFACE_DNS_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		port_orig[INTERFACE_PORT_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ip_orig[INTERFACE_IP_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		dns_orig[INTERFACE_DNS_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		port_orig[INTERFACE_PORT_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:105:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		host[HOST_HOST_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:106:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[HOST_NAME_LEN * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1];
data/zabbix-5.0.5+dfsg/include/dbcache.h:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ipmi_username[HOST_IPMI_USERNAME_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:122:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ipmi_password[HOST_IPMI_PASSWORD_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tls_issuer[HOST_TLS_ISSUER_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:132:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tls_subject[HOST_TLS_SUBJECT_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:133:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tls_psk_identity[HOST_TLS_PSK_IDENTITY_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:134:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tls_psk[HOST_TLS_PSK_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:136:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		error[HOST_ERROR_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		snmp_error[HOST_ERROR_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:138:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ipmi_error[HOST_ERROR_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		jmx_error[HOST_ERROR_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			key_orig[ITEM_KEY_LEN * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1], *key;
data/zabbix-5.0.5+dfsg/include/dbcache.h:179:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			trapper_hosts[ITEM_TRAPPER_HOSTS_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:180:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			logtimefmt[ITEM_LOGTIMEFMT_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:181:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			snmp_community_orig[ITEM_SNMP_COMMUNITY_LEN_MAX], *snmp_community;
data/zabbix-5.0.5+dfsg/include/dbcache.h:182:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			snmp_oid_orig[ITEM_SNMP_OID_LEN_MAX], *snmp_oid;
data/zabbix-5.0.5+dfsg/include/dbcache.h:183:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			snmpv3_securityname_orig[ITEM_SNMPV3_SECURITYNAME_LEN_MAX], *snmpv3_securityname;
data/zabbix-5.0.5+dfsg/include/dbcache.h:184:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			snmpv3_authpassphrase_orig[ITEM_SNMPV3_AUTHPASSPHRASE_LEN_MAX], *snmpv3_authpassphrase;
data/zabbix-5.0.5+dfsg/include/dbcache.h:185:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			snmpv3_privpassphrase_orig[ITEM_SNMPV3_PRIVPASSPHRASE_LEN_MAX], *snmpv3_privpassphrase;
data/zabbix-5.0.5+dfsg/include/dbcache.h:186:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ipmi_sensor[ITEM_IPMI_SENSOR_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:188:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			username_orig[ITEM_USERNAME_LEN_MAX], *username;
data/zabbix-5.0.5+dfsg/include/dbcache.h:189:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			publickey_orig[ITEM_PUBLICKEY_LEN_MAX], *publickey;
data/zabbix-5.0.5+dfsg/include/dbcache.h:190:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			privatekey_orig[ITEM_PRIVATEKEY_LEN_MAX], *privatekey;
data/zabbix-5.0.5+dfsg/include/dbcache.h:191:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			password_orig[ITEM_PASSWORD_LEN_MAX], *password;
data/zabbix-5.0.5+dfsg/include/dbcache.h:192:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			snmpv3_contextname_orig[ITEM_SNMPV3_CONTEXTNAME_LEN_MAX], *snmpv3_contextname;
data/zabbix-5.0.5+dfsg/include/dbcache.h:193:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			jmx_endpoint_orig[ITEM_JMX_ENDPOINT_LEN_MAX], *jmx_endpoint;
data/zabbix-5.0.5+dfsg/include/dbcache.h:194:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			timeout_orig[ITEM_TIMEOUT_LEN_MAX], *timeout;
data/zabbix-5.0.5+dfsg/include/dbcache.h:195:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			url_orig[ITEM_URL_LEN_MAX], *url;
data/zabbix-5.0.5+dfsg/include/dbcache.h:196:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			query_fields_orig[ITEM_QUERY_FIELDS_LEN_MAX], *query_fields;
data/zabbix-5.0.5+dfsg/include/dbcache.h:198:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			status_codes_orig[ITEM_STATUS_CODES_LEN_MAX], *status_codes;
data/zabbix-5.0.5+dfsg/include/dbcache.h:199:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			http_proxy_orig[ITEM_HTTP_PROXY_LEN_MAX], *http_proxy;
data/zabbix-5.0.5+dfsg/include/dbcache.h:201:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ssl_cert_file_orig[ITEM_SSL_CERT_FILE_LEN_MAX], *ssl_cert_file;
data/zabbix-5.0.5+dfsg/include/dbcache.h:202:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ssl_key_file_orig[ITEM_SSL_KEY_FILE_LEN_MAX], *ssl_key_file;
data/zabbix-5.0.5+dfsg/include/dbcache.h:203:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ssl_key_password_orig[ITEM_SSL_KEY_PASSWORD_LEN_MAX], *ssl_key_password;
data/zabbix-5.0.5+dfsg/include/dbcache.h:280:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		host[HOST_HOST_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:288:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		addr_orig[INTERFACE_ADDR_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:289:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		port_orig[INTERFACE_PORT_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:298:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tls_issuer[HOST_TLS_ISSUER_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:299:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tls_subject[HOST_TLS_SUBJECT_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:300:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tls_psk_identity[HOST_TLS_PSK_IDENTITY_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:301:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tls_psk[HOST_TLS_PSK_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/dbcache.h:303:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		proxy_address[HOST_PROXY_ADDRESS_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/discovery.h:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		dns[INTERFACE_DNS_LEN_MAX];
data/zabbix-5.0.5+dfsg/include/discovery.h:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		value[MAX_DISCOVERED_VALUE_SIZE];
data/zabbix-5.0.5+dfsg/include/perfmon.h:59:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t			name[PDH_MAX_COUNTER_NAME];
data/zabbix-5.0.5+dfsg/include/sysinfo.h:334:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			fsname[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/include/sysinfo.h:335:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			fstype[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/include/zbxalgo.h:120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			padding[sizeof(void *) - sizeof(zbx_hash_t)];
data/zabbix-5.0.5+dfsg/include/zbxalgo.h:122:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			data[1];
data/zabbix-5.0.5+dfsg/include/zbxipcservice.h:55:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	rx_buffer[ZBX_IPC_SOCKET_BUFFER_SIZE];
data/zabbix-5.0.5+dfsg/include/zbxjson.h:235:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buf_stat[ZBX_JSON_STAT_BUF_LEN];
data/zabbix-5.0.5+dfsg/include/zbxserialize.h:36:46:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define zbx_serialize_uint64(buffer, value) (memcpy(buffer, &value, sizeof(zbx_uint64_t)), sizeof(zbx_uint64_t))
data/zabbix-5.0.5+dfsg/include/zbxserialize.h:38:43:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define zbx_serialize_int(buffer, value) (memcpy(buffer, (int *)&value, sizeof(int)), sizeof(int))
data/zabbix-5.0.5+dfsg/include/zbxserialize.h:40:45:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define zbx_serialize_short(buffer, value) (memcpy(buffer, (short *)&value, sizeof(short)), sizeof(short))
data/zabbix-5.0.5+dfsg/include/zbxserialize.h:42:46:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define zbx_serialize_double(buffer, value) (memcpy(buffer, (double *)&value, sizeof(double)), sizeof(double))
data/zabbix-5.0.5+dfsg/include/zbxserialize.h:56:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buffer, (zbx_uint32_t *)&len, sizeof(zbx_uint32_t)),	\
data/zabbix-5.0.5+dfsg/include/zbxserialize.h:57:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buffer + sizeof(zbx_uint32_t), value, len),		\
data/zabbix-5.0.5+dfsg/include/zbxserialize.h:62:45:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define zbx_serialize_value(buffer, value) (memcpy(buffer, &value, sizeof(value)), sizeof(value))
data/zabbix-5.0.5+dfsg/include/zbxserialize.h:67:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(memcpy(value, buffer, sizeof(zbx_uint64_t)), sizeof(zbx_uint64_t))
data/zabbix-5.0.5+dfsg/include/zbxserialize.h:70:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(memcpy(value, buffer, sizeof(int)), sizeof(int))
data/zabbix-5.0.5+dfsg/include/zbxserialize.h:73:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(memcpy(value, buffer, sizeof(short)), sizeof(short))
data/zabbix-5.0.5+dfsg/include/zbxserialize.h:79:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(memcpy(value, buffer, sizeof(double)), sizeof(double))
data/zabbix-5.0.5+dfsg/include/zbxserialize.h:83:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&value_len, buffer, sizeof(zbx_uint32_t)),		\
data/zabbix-5.0.5+dfsg/include/zbxserialize.h:86:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(*(value), buffer + sizeof(zbx_uint32_t), value_len),	\
data/zabbix-5.0.5+dfsg/include/zbxserialize.h:94:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&value_len, buffer, sizeof(zbx_uint32_t)),		\
data/zabbix-5.0.5+dfsg/include/zbxserialize.h:95:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(value, buffer + sizeof(zbx_uint32_t), value_len),	\
data/zabbix-5.0.5+dfsg/include/zbxserialize.h:102:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&value_len, buffer, sizeof(zbx_uint32_t)),			\
data/zabbix-5.0.5+dfsg/include/zbxserialize.h:108:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	(memcpy(value, buffer, sizeof(*value)), sizeof(*value))
data/zabbix-5.0.5+dfsg/include/zbxserialize.h:113:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&value_len, buffer, sizeof(zbx_uint32_t)),			\
data/zabbix-5.0.5+dfsg/include/zbxserialize.h:115:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*(value), buffer, value_len + sizeof(zbx_uint32_t)),		\
data/zabbix-5.0.5+dfsg/include/zbxtypes.h:45:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#	define zbx_open(pathname, flags)	open(pathname, flags | O_BINARY)
data/zabbix-5.0.5+dfsg/include/zbxtypes.h:48:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#	define zbx_open(pathname, flags)	open(pathname, flags)
data/zabbix-5.0.5+dfsg/include/zbxtypes.h:200:57:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
#define ZBX_STR2UCHAR(var, string) var = (unsigned char)atoi(string)
data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/evaluate.c:159:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			*unknown_idx = atoi(p0);
data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/hashset.c:231:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *)entry->data + offset, (const char *)data + offset, size - offset);
data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/prediction.c:84:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dest->elements, src->elements, sizeof(double) * src->rows * src->columns);
data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/vectorimpl.h:95:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(vector->values + vector->values_num, values, values_num * sizeof(__type));			\
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/comms.c:133:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buf[8];
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/comms.c:144:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&data, buf, sizeof(buf));
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/comms.c:168:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buf[8];
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/comms.c:199:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buf[4];
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/comms.c:206:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&data, buf, sizeof(buf));
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/comms.c:226:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buf[4];
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:91:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char	ZABBIX_SERVICE_NAME[ZBX_SERVICE_NAME_LEN] = APPLICATION_NAME;
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:92:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char	ZABBIX_EVENT_SOURCE[ZBX_SERVICE_NAME_LEN] = APPLICATION_NAME;
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:480:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const unsigned char	month[12] = { 31, 28, 31, 30, 31, 30, 31, 31, 30, 31, 30, 31 };
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:673:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	title[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:2660:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			if (value == atoi(start))
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:2940:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(value, (unsigned char *)&value_uint64 + *((unsigned char *)&value_offset), size);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:3004:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(value, (unsigned char *)&value_uint64 + *((unsigned char *)&value_offset), size);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:3033:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	tmp[16];
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/setproctitle.c:47:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char	ps_buf[PS_BUF_SIZE], *p_msg = NULL;
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:346:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*str + *offset, src, n);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:710:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, src, size);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1175:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	buffer[32];
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1196:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	buffer[11];
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1210:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	buffer[9];
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1689:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[16];
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1777:14:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
	wide_size = MultiByteToWideChar(codepage, 0, cp_string, -1, NULL, 0);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1781:2:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
	MultiByteToWideChar(codepage, 0, cp_string, -1, wide_string, wide_size);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1801:11:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
	if (0 == MultiByteToWideChar(CP_ACP, 0, acp_string, -1, wide_string, wide_size))
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1856:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t		wide_string_static[STATIC_SIZE], *wide_string = NULL;
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1890:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(utf8_string, in, in_size);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1946:15:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
		wide_size = MultiByteToWideChar(codepage, 0, in, (int)in_size, NULL, 0);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1954:3:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
		MultiByteToWideChar(codepage, 0, in, (int)in_size, wide_string, wide_size);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1999:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(out, in, in_size);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:2536:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p_dst, p_src, maxline);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:2540:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p_dst, delim, delim_size);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:2547:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p_dst, p_src, left);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:2668:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(*data)[l], value, sz_value);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:2903:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*name, macro, len - 1);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:3169:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(out, param, len);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:4645:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(str, src + loc->l, len);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:5496:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*data + offset, from, sz_from);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:5534:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*left, src, left_size - 1);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:5536:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*right, delimiter_ptr + 1, right_size);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:5678:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	return ZBX_COMPONENT_VERSION(atoi(value), atoi(pminor));
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:5678:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	return ZBX_COMPONENT_VERSION(atoi(value), atoi(pminor));
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:5715:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tmp, text, len);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant.c:30:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(value_bin, bin, size + sizeof(size));
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant.c:40:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(value_bin, &size, sizeof(size));
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant.c:41:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy((unsigned char *)value_bin + sizeof(size), data, size);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant.c:50:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&size, bin, sizeof(zbx_uint32_t));
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant.c:149:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant.c:181:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant.c:215:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*value_str, buffer[ZBX_MAX_DOUBLE_LEN + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant.c:260:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant.c:291:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static ZBX_THREAD_LOCAL char	buffer[ZBX_MAX_DOUBLE_LEN + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/variant_misc.c:51:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char	buffer[ZBX_MAX_DOUBLE_LEN + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/xml.c:22:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char	data_static[ZBX_MAX_B64_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/zbxgetopt.c:241:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char empty_string[1];
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:47:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern ZBX_THREAD_LOCAL char	info_buf[256];
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:66:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char	zbx_socket_strerror_message[ZBX_SOCKET_STRERROR_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:111:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&s->peer_info, &sa, (size_t)sz);
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:531:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		service[8], *error = NULL;
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:842:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	header_buf[ZBX_TLS_MAX_REC_LEN];	/* Buffer is allocated on stack with a hope that it   */
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:859:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(header_buf, ZBX_TCP_HEADER_DATA, ZBX_CONST_STRLEN(ZBX_TCP_HEADER_DATA));
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:865:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(header_buf + offset, &len32_le, sizeof(len32_le));
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:869:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(header_buf + offset, &len32_le, sizeof(len32_le));
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:873:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(header_buf + offset, data, take_bytes);
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:1002:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		port[8], *ip, *ips, *delim;
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:1548:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[ZBX_STAT_BUF_LEN], *ptr = NULL;
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:1747:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(s->buffer + buf_dyn_bytes, s->buf_stat, nbytes);
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:1800:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&expected_len, s->buf_stat + offset, sizeof(zbx_uint32_t));
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:1804:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&reserved, s->buf_stat + offset, sizeof(zbx_uint32_t));
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:1840:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(s->buffer, s->buf_stat + offset, buf_dyn_bytes);
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:1987:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(s->buffer + buf_dyn_bytes, s->buf_stat, nbytes);
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2000:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(s->buffer, s->buf_stat, sizeof(s->buf_stat));
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2023:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	netmask[16] = {0};
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2047:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		if ((((const unsigned char *)address1)[i] & netmask[i]) !=
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2048:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				(((const unsigned char *)address2)[i] & netmask[i]))
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2062:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const unsigned char	ipv4_compat_mask[12] = {0};
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2064:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const unsigned char	ipv4_mapped_mask[12] = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 255, 255};
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2097:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char	ipv6_compat_address[16], ipv6_mapped_address[16];
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2113:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ipv6_compat_address, ipv4_compat_mask, sizeof(ipv4_compat_mask));
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2114:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&ipv6_compat_address[sizeof(ipv4_compat_mask)], &name4->sin_addr.s_addr, 4);
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2116:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(ipv6_mapped_address, ipv4_mapped_mask, sizeof(ipv4_mapped_mask));
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2117:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&ipv6_mapped_address[sizeof(ipv4_mapped_mask)], &name4->sin_addr.s_addr, 4);
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2148:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmp[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2342:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[65508];	/* maximum payload for UDP over IPv4 is 65507 bytes */
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/comms.c:2371:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(s->buffer, buffer, read_bytes + 1);
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/telnet.c:310:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[MAX_BUFFER_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/telnet.c:337:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[MAX_BUFFER_LEN], c;
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/telnet.c:412:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[MAX_BUFFER_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxcommshigh/comms.c:113:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			value[16];
data/zabbix-5.0.5+dfsg/src/libs/zbxcompress/compress.c:40:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	message[ZBX_COMPRESS_STRERROR_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxconf/cfg.c:381:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[MAX_STRING_LEN + 3], *parameter, *value;
data/zabbix-5.0.5+dfsg/src/libs/zbxconf/cfg.c:403:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (NULL == (file = fopen(cfg_file, "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxconf/cfg.c:472:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						*((char **)cfg[i].variable) =
data/zabbix-5.0.5+dfsg/src/libs/zbxconf/cfg.c:473:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
								zbx_strdup(*((char **)cfg[i].variable), value);
data/zabbix-5.0.5+dfsg/src/libs/zbxconf/cfg.c:476:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						zbx_strarr_add((char ***)cfg[i].variable, value);
data/zabbix-5.0.5+dfsg/src/libs/zbxconf/cfg.c:526:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				if (NULL == (*(char **)cfg[i].variable))
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/base64.c:233:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		from[4];
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/base64.c:234:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	to[4];
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/md5.c:170:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(xbuf, data, 64);
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/md5.c:344:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pms->buf + offset, p, copy);
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/md5.c:358:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pms->buf, p, left);
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:208:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static ZBX_THREAD_LOCAL char			incoming_connection_psk_id[PSK_MAX_IDENTITY_LEN + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:211:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
ZBX_THREAD_LOCAL char				info_buf[256];
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:227:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	msg[1024];
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:247:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	msg[1024];
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:327:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		err[1024];
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1068:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	tls_psk_hex[HOST_TLS_PSK_LEN_MAX], psk_buf[HOST_TLS_PSK_LEN / 2];
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1145:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(key->data, psk, psk_len);
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1205:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(psk, psk_for_cb, psk_len_for_cb);
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1238:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	tls_psk_hex[HOST_TLS_PSK_LEN_MAX], psk_buf[HOST_TLS_PSK_LEN / 2];
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1316:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(psk, psk_loc, psk_len);
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1368:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[HOST_TLS_PSK_LEN_MAX + 2];	/* up to 512 bytes of hex-digits, maybe 1-2 bytes for '\n', */
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1370:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf_bin[HOST_TLS_PSK_LEN / 2];	/* up to 256 bytes of binary PSK */
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1372:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (f = fopen(CONFIG_TLS_PSK_FILE, "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1414:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(my_psk, buf_bin, my_psk_len);
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1674:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			oid_str[128];		/* size equal to MAX_OID_SIZE, internally defined in GnuTLS */
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1691:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(ava_dyn, ava_stat, ZBX_AVA_BUF_SIZE * sizeof(gnutls_x509_ava_st));
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1742:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(oid_str, ava->oid.data, ava->oid.size);
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1949:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			issuer[HOST_TLS_ISSUER_LEN_MAX], subject[HOST_TLS_SUBJECT_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:2062:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tls_issuer[HOST_TLS_ISSUER_LEN_MAX], tls_subject[HOST_TLS_SUBJECT_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:3382:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char	psk_buf[HOST_TLS_PSK_LEN / 2];
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:3562:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	psk_buf[HOST_TLS_PSK_LEN / 2];
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls_tcp_active.h:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		issuer[HOST_TLS_ISSUER_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls_tcp_active.h:29:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		subject[HOST_TLS_SUBJECT_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:172:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	errbuf[512];
data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:381:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char	*keywords[ZBX_DB_MAX_PARAMS + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:382:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char	*values[ZBX_DB_MAX_PARAMS + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:782:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ZBX_PG_BYTEAOID = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:1510:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ret = atoi(PQcmdTuples(result));
data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:1927:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	errbuf[512];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		table_name[ZBX_TABLENAME_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:621:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		num = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:760:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&trends[num++], &trends[i], sizeof(ZBX_DC_TREND));
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:784:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&(*trends)[*trends_num], trend, sizeof(ZBX_DC_TREND));
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:937:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(trends_tmp, trends, trends_num * sizeof(ZBX_DC_TREND));
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:1621:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			value[MAX_BUFFER_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:1865:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char	buffer[ZBX_MAX_DOUBLE_LEN + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:2165:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[64], *pvalue;
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:2233:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[64], *pvalue;
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:3391:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&string_values[string_values_offset], value_orig, item_value->value.value_str.len);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:3445:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&string_values[string_values_offset], log->value, item_value->value.value_str.len);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:3452:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&string_values[string_values_offset], log->source, item_value->source.len);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:3479:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&string_values[string_values_offset], error, item_value->value.value_str.len);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:3497:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&string_values[string_values_offset], value_orig, item_value->value.value_str.len);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:3785:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, &string_values[str->pvalue], str->len - 1);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:117:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst, source, len);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:901:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char	*row[ARRSIZE(selected_fields)];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:963:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	config->config->default_inventory_mode = atoi(row[26]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:988:65:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (ZBX_HK_OPTION_ENABLED == (config->config->hk.events_mode = atoi(row[9])) &&
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:999:67:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (ZBX_HK_OPTION_ENABLED == (config->config->hk.services_mode = atoi(row[14])) &&
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1007:64:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (ZBX_HK_OPTION_ENABLED == (config->config->hk.audit_mode = atoi(row[16])) &&
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1015:67:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (ZBX_HK_OPTION_ENABLED == (config->config->hk.sessions_mode = atoi(row[18])) &&
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1023:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	config->config->hk.history_mode = atoi(row[20]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1024:68:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (ZBX_HK_OPTION_ENABLED == (config->config->hk.history_global = atoi(row[21])) &&
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1042:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	config->config->hk.trends_mode = atoi(row[23]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1043:67:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (ZBX_HK_OPTION_ENABLED == (config->config->hk.trends_global = atoi(row[24])) &&
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1410:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			host->maintenance_status = (unsigned char)atoi(row[7]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1411:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			host->maintenance_type = (unsigned char)atoi(row[8]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1412:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			host->maintenance_from = atoi(row[9]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1416:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			host->errors_from = atoi(row[10]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1417:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			host->available = (unsigned char)atoi(row[11]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1418:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			host->disable_until = atoi(row[12]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1419:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			host->snmp_errors_from = atoi(row[13]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1420:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			host->snmp_available = (unsigned char)atoi(row[14]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1421:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			host->snmp_disable_until = atoi(row[15]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1422:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			host->ipmi_errors_from = atoi(row[16]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1423:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			host->ipmi_available = (unsigned char)atoi(row[17]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1424:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			host->ipmi_disable_until = atoi(row[18]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1425:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			host->jmx_errors_from = atoi(row[19]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1426:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			host->jmx_available = (unsigned char)atoi(row[20]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1427:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			host->jmx_disable_until = atoi(row[21]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1479:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ipmi_authtype = (signed char)atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1480:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ipmi_privilege = (unsigned char)atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1512:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				proxy->lastaccess = atoi(row[24]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:1520:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			proxy->auto_compress = atoi(row[32 + ZBX_HOST_TLS_OFFSET]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2618:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		item->flags = (unsigned char)atoi(row[18]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2646:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			item->state = (unsigned char)atoi(row[12]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2648:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			item->mtime = atoi(row[21]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2836:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			sshitem->authtype = (unsigned short)atoi(row[13]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2963:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			httpitem->follow_redirects = (unsigned char)atoi(row[35]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2964:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			httpitem->post_type = (unsigned char)atoi(row[36]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2967:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			httpitem->retrieve_mode = (unsigned char)atoi(row[39]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2968:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			httpitem->request_method = (unsigned char)atoi(row[40]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2969:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			httpitem->output_format = (unsigned char)atoi(row[41]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2973:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			httpitem->verify_peer = (unsigned char)atoi(row[45]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2974:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			httpitem->verify_host = (unsigned char)atoi(row[46]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2975:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			httpitem->allow_traps = (unsigned char)atoi(row[47]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:2977:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			httpitem->authtype = (unsigned char)atoi(row[13]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:3388:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			trigger->lastchange = atoi(row[8]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:3897:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		action->opflags = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:4754:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		op->step = atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:4755:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		op->error_handler = atoi(row[6]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:6569:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char		autoreg_psk_tmp[HOST_TLS_PSK_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:6988:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst_function->function, src_function->function, sz_function);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:6989:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst_function->parameter, src_function->parameter, sz_parameter);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:12775:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*exp, *tmp,*expanded, error[128];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.h:358:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char	*values[HOST_INVENTORY_FIELD_COUNT];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.h:520:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char	*severity_name[TRIGGER_SEVERITY_COUNT];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.h:831:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			autoreg_psk_identity[HOST_TLS_PSK_IDENTITY_LEN_MAX];	/* autoregistration PSK */
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.h:832:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			autoreg_psk[HOST_TLS_PSK_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig_maintenance.c:105:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		maintenance->active_since = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig_maintenance.c:106:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		maintenance->active_until = atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig_maintenance.c:301:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		period->every = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig_maintenance.c:302:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		period->month = atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig_maintenance.c:303:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		period->dayofweek = atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig_maintenance.c:304:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		period->day = atoi(row[5]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig_maintenance.c:305:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		period->start_time = atoi(row[6]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig_maintenance.c:306:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		period->period = atoi(row[7]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig_maintenance.c:307:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		period->start_date = atoi(row[8]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:110:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	return (atoi(value_raw) == value ? SUCCEED : FAIL);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:258:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(sync->row, row, sizeof(char *) * sync->columns_num);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:620:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	ipmi_authtype = (signed char)atoi(dbrow[3]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:621:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	ipmi_privilege = (unsigned char)atoi(dbrow[4]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:894:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			hostid_s[MAX_ID_LEN + 1], templateid_s[MAX_ID_LEN + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:895:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*del_row[2] = {hostid_s, templateid_s};
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:2242:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			down_s[MAX_ID_LEN + 1], up_s[MAX_ID_LEN + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:2243:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*del_row[2] = {down_s, up_s};
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:2675:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	actionid_s[MAX_ID_LEN], opflags_s[MAX_ID_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:2733:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		switch (atoi(dbrow[1]))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:3997:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			maintenanceid_s[MAX_ID_LEN + 1], groupid_s[MAX_ID_LEN + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:3998:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*del_row[2] = {maintenanceid_s, groupid_s};
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:4074:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			maintenanceid_s[MAX_ID_LEN + 1], hostid_s[MAX_ID_LEN + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:4075:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*del_row[2] = {maintenanceid_s, hostid_s};
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:4151:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			groupid_s[MAX_ID_LEN + 1], hostid_s[MAX_ID_LEN + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:4152:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*del_row[2] = {groupid_s, hostid_s};
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/valuecache.c:1645:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&item->tail->slots[item->tail->first_value - values_num], values,
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:557:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		count = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:581:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		*lastaccess = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:1238:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char	buf_string[640];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:1335:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		user_type = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:1453:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char		buf[22];	/* 1 - '=', 20 - value size, 1 - '\0' */
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:1454:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char	is_null[9] = " is null";
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:1615:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						autoreg_host->flag != atoi(row[7]))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:2009:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char		buf[4][21];	/* 20 - value size, 1 - '\0' */
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:2010:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char	null[5] = "null";
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:2037:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static const char	*inventory_fields[HOST_INVENTORY_FIELD_COUNT] =
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:2440:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*database_name_esc, *schema_name_esc, oid[OID_LENGTH_MAX];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:2875:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*sql_command, delim[2] = {',', '('};
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:3363:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char	*field_prefix[ZBX_AGENT_MAX] = {"", "snmp_", "ipmi_", "jmx_"};
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:3451:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	user->type = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/discovery.c:185:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		dhost->status = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/discovery.c:186:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		dhost->lastup = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/discovery.c:187:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		dhost->lastdown = atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/discovery.c:253:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		dservice->status = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/discovery.c:254:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		dservice->lastup = atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/discovery.c:255:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		dservice->lastdown = atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/event.c:70:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		event->source = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/event.c:71:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		event->object = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/event.c:73:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		event->clock = atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/event.c:74:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		event->value = atoi(row[5]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/event.c:75:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		event->acknowledged = atoi(row[6]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/event.c:76:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		event->ns = atoi(row[7]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/event.c:78:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		event->severity = atoi(row[9]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c:83:30:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (history_file = fopen(history_file_name, "a")))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c:92:29:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (trends_file = fopen(trends_file_name, "a")))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c:104:31:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (problems_file = fopen(problems_file_name, "a")))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c:118:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		log_str[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c:122:41:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == *file && (NULL == (*file = fopen(name, "a"))))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c:138:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	filename_old[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c:166:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (NULL == (*file = fopen(name, "a")))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:386:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		search[MAX_ID_LEN + 3], replace[MAX_ID_LEN + 3], *old_expr = NULL, *expr = NULL, *rexpr = NULL;
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:638:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		gitem->drawtype = atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:639:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		gitem->sortorder = atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:641:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		gitem->yaxisside = atoi(row[6]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:642:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		gitem->calc_fnc = atoi(row[7]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:643:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		gitem->type = atoi(row[8]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:644:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		gitem->flags = (unsigned char)atoi(row[9]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:750:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		t_flags = (unsigned char)atoi(trow[2]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:782:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			h_flags = (unsigned char)atoi(hrow[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:858:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			type = (unsigned char)atoi(trow[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:878:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			type = (unsigned char)atoi(trow[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3043:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (0 == atoi(row[0]))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3097:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		host_prototype->status = (unsigned char)atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3099:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		host_prototype->discover = (unsigned char)atoi(row[5]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3143:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					if (host_prototype->status != (status = (unsigned char)atoi(row[4])))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3145:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					if (host_prototype->discover != (unsigned char)atoi(row[5]))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3980:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				(unsigned char)atoi(row[10]),	/* recovery_mode */
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3981:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				(unsigned char)atoi(row[3]),	/* status */
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3982:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				(unsigned char)atoi(row[4]),	/* type */
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3983:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				(unsigned char)atoi(row[5]),	/* priority */
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3986:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				(unsigned char)atoi(row[8]),	/* flags */
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3987:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				(unsigned char)atoi(row[11]),	/* correlation_mode */
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3989:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				(unsigned char)atoi(row[13]),	/* manual_close */
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:3991:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				(unsigned char)atoi(row[15]));	/* discover */
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4316:5:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				atoi(row[2]),			/* width */
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4317:5:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				atoi(row[3]),			/* height */
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4320:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				(unsigned char)atoi(row[6]),	/* show_work_period */
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4321:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				(unsigned char)atoi(row[7]),	/* show_triggers */
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4322:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				(unsigned char)atoi(row[8]),	/* graphtype */
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4323:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				(unsigned char)atoi(row[9]),	/* show_legend */
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4324:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				(unsigned char)atoi(row[10]),	/* show_3d */
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4327:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				(unsigned char)atoi(row[13]),	/* ymin_type */
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4328:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				(unsigned char)atoi(row[14]),	/* ymax_type */
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4331:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				(unsigned char)atoi(row[17]),	/* flags */
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4332:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				(unsigned char)atoi(row[18]));	/* discover */
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4463:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			httptest->status = (unsigned char)atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4465:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			httptest->authentication = (unsigned char)atoi(row[6]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4469:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			httptest->retries = atoi(row[10]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4513:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			httpfield->type = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4556:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			httpstep->no = atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4562:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			httpstep->follow_redirects = atoi(row[9]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4563:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			httpstep->retrieve_mode = atoi(row[10]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4564:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			httpstep->post_type = atoi(row[11]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4627:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			httpfield->type = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4704:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			httptestitem->type = (unsigned char)atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:4766:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			httpstepitem->type = (unsigned char)atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:5179:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*template_names, err[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:5423:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		db_useip = (unsigned char)atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:5426:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		db_main = (unsigned char)atoi(row[5]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:5719:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		internal = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/host.c:5910:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	else if (inventory_mode != atoi(row[0]))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/itservices.c:280:63:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			itservice = its_itservice_create(itservices, serviceid, 0, atoi(row[1]), atoi(row[2]));
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/itservices.c:280:77:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			itservice = its_itservice_create(itservices, serviceid, 0, atoi(row[1]), atoi(row[2]));
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/itservices.c:347:59:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			parent = its_itservice_create(itservices, parentid, 0, atoi(row[1]), atoi(row[2]));
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/itservices.c:347:73:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			parent = its_itservice_create(itservices, parentid, 0, atoi(row[1]), atoi(row[2]));
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/itservices.c:405:70:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		itservice = its_itservice_create(itservices, serviceid, triggerid, atoi(row[2]), atoi(row[3]));
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/itservices.c:405:84:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		itservice = its_itservice_create(itservices, serviceid, triggerid, atoi(row[2]), atoi(row[3]));
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ip[INTERFACE_IP_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:127:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char	*availability_tag_available[ZBX_AGENT_MAX] = {ZBX_PROTO_TAG_AVAILABLE,
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:130:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char	*availability_tag_error[ZBX_AGENT_MAX] = {ZBX_PROTO_TAG_ERROR,
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:338:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*ch_error, host[HOST_HOST_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:572:46:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (SUCCEED == is_item_processed_by_server(atoi(row[fld_type]), row[fld_key]))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:1601:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						value->i32 = atoi(buf);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:1850:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buf[ZBX_TABLENAME_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2058:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ha->agents[i].available = atoi(tmp);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2243:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ts = (int)time(NULL) - atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2264:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		sql[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2452:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		hd->clock = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2453:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		hd->ns = atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2463:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				hd->timestamp = atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2464:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				hd->severity = atoi(row[6]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2465:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				hd->logeventid = atoi(row[8]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2479:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(*string_buffer + hd->source_offset, row[5], len1);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2483:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(*string_buffer + hd->value_offset, row[7], len2);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2490:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				hd->mtime = atoi(row[11]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3059:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tmp[32];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3068:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		sec = atoi(tmp);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3073:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			ns = atoi(tmp);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3154:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		av->state = (unsigned char)atoi(tmp);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3167:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				av->mtime = atoi(tmp);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3175:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		av->timestamp = atoi(tmp);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3181:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		av->severity = atoi(tmp);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3184:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		av->logeventid = atoi(tmp);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3214:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[MAX_ID_LEN + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3597:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			key_short[VALUE_ERRMSG_MAX * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3766:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tmp[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3985:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				service->itemtime = (time_t)atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3986:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				service->port = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3988:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				service->status = atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:4090:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ip[INTERFACE_IP_LEN_MAX],
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:4113:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		itemtime = atoi(tmp);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:4161:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			status = atoi(tmp);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:4276:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			host[HOST_HOST_LEN_MAX], ip[INTERFACE_IP_LEN_MAX], dns[INTERFACE_DNS_LEN_MAX],
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:4298:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		itemtime = atoi(tmp);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:4319:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			flags_int = atoi(tmp);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:4431:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		count = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:4454:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	value[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:4619:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		proxy_diff.more_data = atoi(value);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:4627:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		proxy_diff.proxy_delay = atoi(value);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c:474:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	srcid[64], dstid[64], *ptr;
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c:1314:73:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		zbx_db_insert_add_values(&db_insert, __UINT64_C(0), (*pitem)->itemid, atoi(row[1]), atoi(row[2]),
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c:1314:87:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		zbx_db_insert_add_values(&db_insert, __UINT64_C(0), (*pitem)->itemid, atoi(row[1]), atoi(row[2]),
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c:1315:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				row[3], atoi(row[4]), row[5]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c:1547:55:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			override_operation->operationtype = (unsigned char)atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c:1548:50:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			override_operation->operator = (unsigned char)atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c:1551:76:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			override_operation->status = FAIL == DBis_null(row[5]) ? (unsigned char)atoi(row[5]) :
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c:1554:78:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			override_operation->discover = FAIL == DBis_null(row[6]) ? (unsigned char)atoi(row[6]) :
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c:1566:78:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		override_operation->severity = FAIL == DBis_null(row[10]) ? (unsigned char)atoi(row[10]) :
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c:1588:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				(unsigned char)atoi(row[14]) : HOST_INVENTORY_COUNT;
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade.c:749:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	sql[64];
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade.c:818:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		*mandatory = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade.c:819:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		*optional = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade.c:1035:59:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (NULL != (row = DBfetch(result)) && total_dbl_cols == atoi(row[0]))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2010.c:521:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			if (SEC_PER_WEEK < (ts = (time_t)atoi(row[1])))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2030.c:504:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		local_nodeid = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2030.c:686:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		local_nodeid = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:287:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		object_events_local.source = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:288:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		object_events_local.object = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:292:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		value = atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:407:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (NULL == (row = DBfetch(result)) || 0 == (actions_num = atoi(row[0])))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:480:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		conditiontype = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:489:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			value = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:521:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			value = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:559:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			if (1 != atoi(row[1]) || 0 != atoi(row[3]) || (0 == atoi(row[0]) && 0 != recovery_msg))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:559:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			if (1 != atoi(row[1]) || 0 != atoi(row[3]) || (0 == atoi(row[0]) && 0 != recovery_msg))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:559:56:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			if (1 != atoi(row[1]) || 0 != atoi(row[3]) || (0 == atoi(row[0]) && 0 != recovery_msg))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:590:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		eventsource = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:591:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		evaltype = atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:592:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		recovery_msg = atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:727:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		value = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:1062:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		eventsource = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:1063:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		evaltype = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:1125:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (0 == atoi(row[3]) && 0 != atoi(row[2]))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:1125:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (0 == atoi(row[3]) && 0 != atoi(row[2]))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3030.c:241:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				formula = (1 == atoi(row[3]) ? row[4] : NULL);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3030.c:1074:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			value = atoi(row[i]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3030.c:1255:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		delay = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3030.c:1265:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				delay = atoi(delay_flex);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3030.c:1381:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			value = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3050.c:1259:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		action = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3050.c:1313:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, src, src_len);	/* parameter body */
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4030.c:281:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		id = atoi(pos + 1);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4030.c:404:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (100 == atoi(row[1]))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4030.c:407:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				0 == atoi(row[4]) ? 160 : 136);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4050.c:266:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		col = 2 + (atoi(row[1]) * 2);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4050.c:290:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*messages[3][3][4] =
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4050.c:429:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		switch (atoi(row[1]))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4050.c:435:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				content_type = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4050.c:1538:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (0 == (value_int = atoi(row[2])))
data/zabbix-5.0.5+dfsg/src/libs/zbxdiag/diag.c:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			name[ZBX_DIAG_FIELD_MAX + 1], value[MAX_ID_LEN + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxdiag/diag.c:171:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char	buf[MAX_ID_LEN + 2];
data/zabbix-5.0.5+dfsg/src/libs/zbxdiag/diag.c:482:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[MAX_ID_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxdiag/diag.c:500:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char	*names[ZBX_MUTEX_COUNT] = {"ZBX_MUTEX_LOG", "ZBX_MUTEX_CACHE", "ZBX_MUTEX_TRENDS",
data/zabbix-5.0.5+dfsg/src/libs/zbxdiag/diag.c:537:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			section[ZBX_DIAG_SECTION_MAX + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxdiag/diag.c:640:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			key[MAX_STRING_LEN], *value = NULL;
data/zabbix-5.0.5+dfsg/src/libs/zbxdiag/diag.c:897:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char			section[ZBX_DIAG_SECTION_MAX + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h:2171:26:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define DUK_MEMCPY       memcpy
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:9401:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
DUK_INTERNAL_DECL char duk_debug_file_stash[DUK_DEBUG_STASH_SIZE];
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:9403:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
DUK_INTERNAL_DECL char duk_debug_func_stash[DUK_DEBUG_STASH_SIZE];
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:10728:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[DUK__DEBUG_BUFSIZE];
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:10747:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
DUK_INTERNAL char duk_debug_file_stash[DUK_DEBUG_STASH_SIZE];
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:10749:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
DUK_INTERNAL char duk_debug_func_stash[DUK_DEBUG_STASH_SIZE];
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:10759:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[DUK__DEBUG_BUFSIZE];
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:11656:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[DUK__ERRFMT_BUFSIZE];
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:17664:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
DUK_LOCAL const char * const duk__symbol_type_strings[4] = {
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:20319:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
DUK_LOCAL const char * const duk__toprim_hint_strings[3] = {
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:25863:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096];
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:30696:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char yearstr[8];   /* "-123456\0" */
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:30697:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tzstr[8];     /* "+11:22\0" */
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:30746:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		            (const char *) yearstr, (int) parts[DUK_DATE_IDX_MONTH], (int) parts[DUK_DATE_IDX_DAY], (int) sep,
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:30751:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		            (const char *) yearstr, (int) parts[DUK_DATE_IDX_MONTH], (int) parts[DUK_DATE_IDX_DAY]);
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:31756:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[DUK__STRPTIME_BUF_SIZE];
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:31816:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[DUK__STRFTIME_BUF_SIZE];
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:35962:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];  /* XXX: how to figure correct size? */
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:37094:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[64];
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:37418:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static const char spaces[10] = {
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:41931:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64+1];
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:42019:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
DUK_LOCAL const char * const duk__bc_optab[256] = {
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:42757:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		duk_fb_sprintf(fb, "%s", (const char *) duk__bc_optab[opcode]);
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:42899:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char fmtbuf[DUK__MAX_FORMAT_TAG_LENGTH];
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:46542:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[DUK_USE_FATAL_MAXLEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:46556:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[DUK_USE_FATAL_MAXLEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:84838:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[DUK__BI_MAX_PARTS * 9 + 64];
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:89979:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			((unsigned char *) ptr)[j] = (unsigned char) (0x80 + j);
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:89989:19:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			x = ((unsigned char *) ptr)[j];
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.h:260:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data[128];
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/embed.c:371:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, ZBX_ES_SCRIPT_HEADER, ZBX_CONST_STRLEN(ZBX_ES_SCRIPT_HEADER));
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/embed.c:373:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, script, len);
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/embed.c:375:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ptr, ZBX_ES_SCRIPT_FOOTER, ZBX_CONST_STRLEN(ZBX_ES_SCRIPT_FOOTER));
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/embed.c:395:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*code, buffer, sz);
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/embed.c:464:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer, code, size);
data/zabbix-5.0.5+dfsg/src/libs/zbxexec/execute.c:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char 		tmp_buf[PIPE_BUFFER_SIZE];
data/zabbix-5.0.5+dfsg/src/libs/zbxexec/execute.c:454:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	tmp_buf[PIPE_BUFFER_SIZE];
data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history.c:163:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	buffer[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_elastic.c:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		errbuf[CURL_ERROR_SIZE];
data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_elastic.c:121:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	buffer[ZBX_MAX_DOUBLE_LEN + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_elastic.c:150:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	hr->timestamp.sec = atoi(value);
data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_elastic.c:155:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	hr->timestamp.ns = atoi(value);
data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_elastic.c:168:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		hr->value.log->timestamp = atoi(value);
data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_elastic.c:173:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		hr->value.log->logeventid = atoi(value);
data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_elastic.c:178:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		hr->value.log->severity = atoi(value);
data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_elastic.c:196:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		http_status[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_elastic.c:514:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char		http_status[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_elastic.c:887:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			pipeline[14]; /* index name length + suffix "-pipeline" */
data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_sql.c:75:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	value->log->timestamp = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_sql.c:76:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	value->log->logeventid = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_sql.c:77:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	value->log->severity = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_sql.c:395:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		value.timestamp.sec = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_sql.c:396:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		value.timestamp.ns = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_sql.c:474:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			value.timestamp.sec = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_sql.c:475:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			value.timestamp.ns = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_sql.c:571:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		value.timestamp.sec = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxhistory/history_sql.c:572:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		value.timestamp.ns = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxhttp/http.c:140:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		auth[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxhttp/punycode.c:202:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*p, tmp[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:127:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		tmp[MAX_STRING_LEN], err[255];
data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:161:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			*value = atoi(p);
data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:177:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			*value = atoi(p);
data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:243:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmp[MAX_STRING_LEN], error[255], *out = NULL;
data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:269:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		params[70];
data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:270:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filename[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:279:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		params6[70];
data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:515:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (f = fopen(filename, "w")))
data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:608:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				index = atoi(c + 1);
data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:18:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char	ipc_path[ZBX_IPC_PATH_MAX] = {0};
data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:155:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ipc_path + offset , ZBX_IPC_SOCKET_PREFIX, ZBX_CONST_STRLEN(ZBX_IPC_SOCKET_PREFIX));
data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:157:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ipc_path + offset, prefix, prefix_len);
data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:159:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ipc_path + offset, service_name, path_len);
data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:161:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ipc_path + offset, ZBX_IPC_SOCKET_SUFFIX, ZBX_CONST_STRLEN(ZBX_IPC_SOCKET_SUFFIX) + 1);
data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:333:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buffer + 2, data, size);
data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:379:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *)header + rx_bytes, buffer, copy_size);
data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:403:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*data + data_offset, buffer + *read_size, copy_size);
data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:1031:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(message->data, data, size);
data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:1425:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dst->data, src->data, src->size);
data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:1485:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ipc_path, path, ipc_path_root_len + 1);
data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:1753:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(client->tx_data, data, size);
data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c:39:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static ZBX_THREAD_LOCAL char	zbx_json_strerror_message[ZBX_JSON_MAX_STRERROR];
data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c:98:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(j->buffer, j->buf_stat, sizeof(j->buf_stat));
data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c:426:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, data, len_data);
data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c:436:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[MAX_ID_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c:444:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[MAX_ID_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c:452:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[MAX_ID_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c:881:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			unsigned char	uc[4];	/* decoded Unicode character takes 1-4 bytes in UTF-8 */
data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c:929:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(out, p, len);
data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c:1043:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c:1266:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&index, segment->data.list.values->data, sizeof(int));
data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.c:148:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(str, source, len);
data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.c:1051:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			value = atoi(start);
data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.c:1052:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(node->data, &value, sizeof(int));
data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.c:1110:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&segment->data.range.end, node->data, sizeof(int));
data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.c:1117:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&segment->data.range.start, node->data, sizeof(int));
data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.c:1920:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				name[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.c:2068:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	name[MAX_ID_LEN + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.c:2148:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.c:2237:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char	name[MAX_ID_LEN + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxjson/jsonpath.h:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				data[1];
data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:32:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char		log_filename[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:113:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (-1 == (fd = open(filename, open_flags, 0666)))
data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:129:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (-1 == (fd = open(default_file, O_RDONLY)))
data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:159:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	filename_old[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:171:28:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			if (NULL != (log_file = fopen(filename, "w")))
data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:311:27:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (NULL == (log_file = fopen(filename, "a+")))
data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:360:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		message[MAX_BUFFER_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:364:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t		thread_id[20], *strings[2];
data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:380:27:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (NULL != (log_file = fopen(log_filename, "a+")))
data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:600:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	utf8_string[ZBX_MESSAGE_BUF_SIZE];
data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:611:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t		wide_string[ZBX_MESSAGE_BUF_SIZE];
data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:613:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	utf8_string[ZBX_MESSAGE_BUF_SIZE];
data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:643:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t		wide_string[ZBX_MESSAGE_BUF_SIZE];
data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:646:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	utf8_string[ZBX_MESSAGE_BUF_SIZE];
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:85:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char	b64_buf[ZBX_EMAIL_B64_MAXWORD_RFC2047 - 12 + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:245:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(mailaddr->disp_name, pstart, (size_t)(angle_addr_start - pstart));
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:280:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		str_time[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:388:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer, payload_status->payload + payload_status->provided_len, current_len);
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:397:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char	labels[3] = {'*', '<', '>'};
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:421:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		cmd[MAX_STRING_LEN], *cmdp = NULL;
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:617:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			url[MAX_STRING_LEN], errbuf[CURL_ERROR_SIZE] = "";
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/sms.c:61:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	rcv[0xff];
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/sms.c:102:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	buffer[0xff], *ebuf = buffer, *sbuf = buffer;
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/sms.c:240:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (-1 == (f = open(device, O_RDWR | O_NOCTTY | O_NDELAY)))
data/zabbix-5.0.5+dfsg/src/libs/zbxmemory/memalloc.c:421:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *)new_chunk + MEM_SIZE_FIELD, (char *)chunk + MEM_SIZE_FIELD, chunk_size);
data/zabbix-5.0.5+dfsg/src/libs/zbxmemory/memalloc.c:446:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tmp, (char *)chunk + MEM_SIZE_FIELD, chunk_size);
data/zabbix-5.0.5+dfsg/src/libs/zbxmemory/memalloc.c:456:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((char *)new_chunk + MEM_SIZE_FIELD, tmp, chunk_size);
data/zabbix-5.0.5+dfsg/src/libs/zbxmodules/modules.c:231:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			full_name[MAX_STRING_LEN], error[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxnix/daemon.c:414:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	error[256];
data/zabbix-5.0.5+dfsg/src/libs/zbxnix/fatal.c:340:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (NULL != (fd = fopen("/proc/self/maps", "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxnix/fatal.c:342:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char line[1024];
data/zabbix-5.0.5+dfsg/src/libs/zbxnix/pid.c:40:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (-1 != (fd = open(pidfile, O_WRONLY | O_APPEND)))
data/zabbix-5.0.5+dfsg/src/libs/zbxnix/pid.c:54:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (fpid = fopen(pidfile, "w")))
data/zabbix-5.0.5+dfsg/src/libs/zbxnix/pid.c:79:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (f_pid = fopen(pidfile, "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxprometheus/zbxprometheus.c:132:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(str, src + loc->l, len);
data/zabbix-5.0.5+dfsg/src/libs/zbxprometheus/zbxprometheus.c:545:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[4];
data/zabbix-5.0.5+dfsg/src/libs/zbxprometheus/zbxprometheus.c:912:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[5];
data/zabbix-5.0.5+dfsg/src/libs/zbxregexp/zbxregexp.c:251:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(matches, ovector, (size_t)((0 < r) ? MIN(r, count) : count) * sizeof(zbx_regmatch_t));
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/evalfunc.c:246:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	logeventid[16];
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/evalfunc.c:3037:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tmp[64];
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/evalfunc.c:3075:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		kmgt[8];
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/evalfunc.c:3076:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tmp[64];
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/evalfunc.c:3153:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				time = (time_t)atoi(value);
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:661:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			user_type = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:774:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			user_type = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1105:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		value[4];
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1158:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		sql[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1460:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		value_type = (unsigned char)atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1465:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char	tmp[MAX_BUFFER_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1619:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		now = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1620:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		type = (unsigned char)atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1621:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		status = (unsigned char)atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1622:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		esc_step = atoi(row[6]);
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1725:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ack.clock = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1729:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ack.action = atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1730:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ack.old_severity = atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:1731:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ack.new_severity = atoi(row[5]);
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:2778:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buffer + 1, *replace_to, replace_to_len);
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:3584:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
								zbx_dobject_status2str(atoi(replace_to)));
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:3595:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
								zbx_age2str(time(NULL) - atoi(replace_to)));
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:3608:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
								zbx_dservice_type_string(atoi(replace_to)));
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:3621:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
								zbx_dobject_status2str(atoi(replace_to)));
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:3632:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
								zbx_age2str(time(NULL) - atoi(replace_to)));
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:5167:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char	buffer[MAX_ID_LEN + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:5369:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			err[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:6148:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			name[MAX_STRING_LEN], value[MAX_STRING_LEN], *p_name = NULL, *p_value = NULL;
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:6369:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*data, (const char *)mem, size + 1);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/aix/proc.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	procargs[MAX_BUFFER_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:39:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static ZBX_THREAD_LOCAL char	buf[16];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:89:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char	buffer[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:133:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*ip, zone[MAX_STRING_LEN], buffer[MAX_STRING_LEN], *zone_str, *param,
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:197:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tmp2[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:207:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buf[PACKETSZ];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:209:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	buf[1024];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:216:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char	buffer[NS_PACKETSZ];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:218:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char	buffer[PACKETSZ];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:220:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char	buffer[512];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:491:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&saved_ns, &(_res.nsaddr_list[0]), sizeof(struct sockaddr_in));
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:524:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(res_state_local._u._ext.ext, &sockaddrin6, sizeof(sockaddrin6));
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:530:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&saved_ns, &(_res.nsaddr_list[0]), sizeof(struct sockaddr_in));
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:548:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(_res._u._ext.ext, &sockaddrin6, sizeof(sockaddrin6));
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:551:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&_res._ext.ext.nsaddrs[0], &sockaddrin6, sizeof(sockaddrin6));
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:601:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(_res._u._ext.ext, &saved_ns6, sizeof(saved_ns6));
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:603:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&_res._ext.ext.nsaddrs[0], &saved_ns6, sizeof(saved_ns6));
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:607:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&(_res.nsaddr_list[0]), &saved_ns, sizeof(struct sockaddr_in));
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:661:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(&inaddr, msg_ptr, INADDRSZ);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:677:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(&in6addr, msg_ptr, IN6ADDRSZ);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dns.c:759:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&inaddr, msg_ptr, INADDRSZ);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/file.c:288:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*filename, *tmp, encoding[32];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/file.c:289:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		read_buf[MAX_BUFFER_LEN], *utf8, *contents = NULL;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/file.c:398:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*filename, *regexp, encoding[32], *output, *start_line_str, *end_line_str;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/file.c:399:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAX_BUFFER_LEN], *utf8, *tmp, *ptr = NULL;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/file.c:519:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*filename, *regexp, *tmp, encoding[32];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/file.c:520:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAX_BUFFER_LEN], *utf8, *start_line_str, *end_line_str;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/net.c:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*ip_str, ip[MAX_ZBX_DNSNAME_LEN + 1], *port_str;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/system.c:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*type, buf[32];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/system.c:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		counter_path[64];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/zabbix_stats.c:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buffer[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/diskio.c:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		dev[DEVSTAT_NAME_LEN + 10];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/diskio.c:99:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		devname[32], *tmp;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/net.c:183:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*port_str, command[64];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/freebsd/net.c:214:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*port_str, command[64];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/net.c:32:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char	buf_ctl[1024];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/net.c:305:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mib, (Ext_mib_t *)(buf_ctl + stat_msg.dl_stat_offset), sizeof(Ext_mib_t));
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/net.c:385:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (-1 == (fd = open("/dev/dlpi", O_RDWR)))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/proc.c:129:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char		cmdline[1024];	/* up to 1020 characters from HP-UX */
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/boottime.c:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/boottime.c:33:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (f = fopen("/proc/stat", "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/cpu.c:193:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/cpu.c:199:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (f = fopen("/proc/stat", "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/cpu.c:228:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/cpu.c:234:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (f = fopen("/proc/stat", "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tmp[MAX_STRING_LEN], name[MAX_STRING_LEN], dev_path[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c:96:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (f = fopen(INFO_FILE_NAME, "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c:142:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tmp[MAX_STRING_LEN], name[MAX_STRING_LEN], dev_path[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c:155:54:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (zbx_stat(dev_path, &dev_st) < 0 || NULL == (f = fopen(INFO_FILE_NAME, "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c:176:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				*devname, *tmp, kernel_devname[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c:303:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tmp[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c:337:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
					if (NULL != (f = fopen(tmp, "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskspace.c:132:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[MAX_STRING_LEN], *p, *mpoint, *mtype;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskspace.c:138:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (f = fopen("/proc/mounts", "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskspace.c:184:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			line[MAX_STRING_LEN], *p, *mpoint, *mtype, *error;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskspace.c:197:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (f = fopen("/proc/mounts", "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskspace.c:254:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (f = fopen("/proc/mounts", "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:147:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (-1 != (fd = open(SYS_TABLE_FILE, O_RDONLY)))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:167:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	else if (-1 != (fd = open(DEV_MEM, O_RDONLY)))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:227:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(smbuf, (char *)mmp + len, smbios_len);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:287:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*mode, buf[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:328:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filename[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:333:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(filename, "r");
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:380:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[MAX_STRING_LEN], name[MAX_STRING_LEN], tmp[MAX_STRING_LEN], buffer[MAX_BUFFER_LEN], *param;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:417:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (f = fopen(HW_CPU_INFO_FILE, "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:436:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			cur_cpu = atoi(tmp);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:514:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*format, *p, *regex, address[MAX_STRING_LEN], buffer[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/kernel.c:26:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	line[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/kernel.c:29:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL != (f = fopen(path, "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/memory.c:115:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (f = fopen("/proc/meminfo", "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/memory.c:223:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (f = fopen("/proc/meminfo", "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:101:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buffer[BUFSIZ] = { 0 };
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:212:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	line[MAX_STRING_LEN], name[MAX_STRING_LEN], *p;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:221:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (f = fopen("/proc/net/dev", "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:300:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (-1 == (fd = open(filename, O_RDONLY)))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:383:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (-1 == (fd = open(filename, O_RDONLY)))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:564:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[MAX_STRING_LEN], *p;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:570:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (f = fopen("/proc/net/dev", "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:607:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		pattern[64], *port_str, *buffer = NULL;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:708:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		pattern[64], *port_str, *buffer = NULL;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmp[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:148:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmp[MAX_STRING_LEN], *p, *p1;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:166:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		uid = (uid_t)atoi(p);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:204:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmp[MAX_STRING_LEN], *p;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:261:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buf[MAX_STRING_LEN], *p_value, *p_unit;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:337:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL != (f = fopen("/proc/meminfo", "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:363:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tmp[MAX_STRING_LEN], *procname, *proccomm, *param;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:531:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (0 == atoi(entries->d_name))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:536:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (NULL == (f_cmd = fopen(tmp, "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:541:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (NULL == (f_stat = fopen(tmp, "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:727:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tmp[MAX_STRING_LEN], *procname, *proccomm, *param;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:798:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (0 == atoi(entries->d_name))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:803:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (NULL == (f_cmd = fopen(tmp, "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:808:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (NULL == (f_stat = fopen(tmp, "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:853:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmp[MAX_STRING_LEN], *pend, *pstart;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:857:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (-1 == (fd = open(tmp, O_RDONLY)))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:898:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmp[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:905:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (-1 == (fd = open(tmp, O_RDONLY)))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:961:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tmp[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:1019:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmp[MAX_STRING_LEN], *ptr;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:1023:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (-1 == (fd = open(tmp, O_RDONLY)))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	line[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:38:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (f = fopen(filename, "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		path[MAX_STRING_LEN], buf[ATTR_MAX], *p;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:103:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (NULL != (f = fopen(path, "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:275:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	sensorname[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:287:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		devicename[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:323:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		hwmon_dir[MAX_STRING_LEN], devicepath[MAX_STRING_LEN], deviced[MAX_STRING_LEN],
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/software.c:51:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*type, line[MAX_STRING_LEN], tmp_line[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/software.c:65:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (NULL == (f = fopen(SW_OS_FULL, "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/software.c:74:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (NULL == (f = fopen(SW_OS_SHORT, "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/software.c:85:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (NULL != (f = fopen(SW_OS_NAME_RELEASE, "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/software.c:102:41:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (FAIL == line_read && NULL == (f = fopen(SW_OS_NAME, "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/software.c:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	fmt[32], tmp[32];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/software.c:182:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buffer[MAX_BUFFER_LEN], *regex, *manager, *mode, tmp[MAX_STRING_LEN], *buf = NULL,
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c:123:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c:133:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (f = fopen(INFO_FILE_NAME, "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c:154:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	line[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c:161:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL != (f = fopen("/proc/stat", "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c:163:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL != (f = fopen("/proc/vmstat", "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c:209:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[MAX_STRING_LEN], *s;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/swap.c:221:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (f = fopen("/proc/swaps", "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/sensors.c:105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char		human[64];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/proc.c:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filename[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/proc.c:92:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			proc = open(filename, O_RDONLY);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/proc.c:160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filename[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/proc.c:216:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			proc = open(filename, O_RDONLY);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osf/swap.c:34:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char path[256];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/net.c:184:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*port_str, command[64];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/osx/net.c:215:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*port_str, command[64];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/simple/ntp.c:148:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		request[NTP_PACKET_SIZE];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/simple/simple.c:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*attrs[2] = {"namingContexts", NULL };
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/simple/simple.c:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		send_buf[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/simple/simple.c:152:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		https_host[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/simple/simple.c:279:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*service, *ip_str, ip[MAX_ZBX_DNSNAME_LEN + 1], *port_str;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/diskspace.c:210:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (f = fopen("/etc/mnttab", "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/diskspace.c:254:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (f = fopen("/etc/mnttab", "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/diskspace.c:296:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (f = fopen("/etc/mnttab", "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/net.c:301:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*port_str, command[64];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/net.c:332:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*port_str, command[64];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:232:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		path[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:243:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (-1 == (fd = open(path, O_RDONLY)))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:268:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (NULL != (fp = fopen(path, "r")))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:406:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tmp[MAX_STRING_LEN], *procname, *proccomm, *param, *memtype = NULL;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:570:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tmp[MAX_STRING_LEN], *procname, *proccomm, *param, *zone_parameter;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:738:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tmp[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:744:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (-1 == (fd = open(tmp, O_RDONLY)))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:757:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (-1 == (fd = open(tmp, O_RDONLY)))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:816:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tmp[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/swap.c:41:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char		path[256];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:202:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	error[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:915:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	buffer[ZBX_MAX_DOUBLE_LEN + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:1666:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(*data + *data_offset, &agent_ret, sizeof(int));
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:1673:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*data + *data_offset, *pvalue, value_len);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:1695:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&agent_ret, data, sizeof(int));
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:1780:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[MAX_STRING_LEN], *data;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:1854:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(data + data_offset, buffer, n);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskspace.c:178:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t	fs_name[MAX_PATH + 1], *long_path = NULL;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskspace.c:196:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(long_path + 4, path, sz * sizeof(wchar_t));
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/hostname.c:30:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t	computerName[256];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/hostname.c:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*type, buffer[256];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/net.c:312:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ip[16];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/pdhmon.c:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	counterpath[PDH_MAX_COUNTER_PATH], *tmp, *error = NULL;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/proc.c:37:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t		name[MAX_NAME], dom[MAX_NAME];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/proc.c:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*procName, *userName, baseName[MAX_PATH], uname[MAX_NAME];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/proc.c:301:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*proc_name, *attr, *type, baseName[MAX_PATH];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/services.c:411:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t			*wname, service_name[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/services.c:555:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t		service_name[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/system.c:90:23:  [2] (integer) _wtoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		vi.dwMinorVersion = _wtoi(ptr);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/system.c:93:22:  [2] (integer) _wtoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	vi.dwMajorVersion = _wtoi(key_value);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/system.c:117:22:  [2] (integer) _wtoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		vi.dwBuildNumber = _wtoi(key_value);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/system.c:211:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			switch (atoi(proc_architecture))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/system.c:218:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						if (32 == atoi(proc_addresswidth))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/uptime.c:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		counter_path[64];
data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:255:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data->data, str, len);
data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:882:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			value[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:894:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	commandtype = atoi(value);
data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:899:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	execute_on = atoi(value);
data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:904:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	port = atoi(value);
data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:909:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	authtype = atoi(value);
data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:970:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				value[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:980:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	status = atoi(value);
data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:1012:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		value[MAX_ID_LEN + 1];
data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:1057:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	type = atoi(value);
data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:1080:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			value[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:1090:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	status = atoi(value);
data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:1121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	value[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:1132:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	clock = atoi(value);
data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:1137:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	ttl = atoi(value);
data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:1274:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			if (SUCCEED != (ret = atoi(row[0])))
data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/fatal.c:123:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t			szProcessName[MAX_PATH];
data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:32:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t		eng_name[PDH_MAX_COUNTER_NAME];
data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:61:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t				eng_name[PDH_MAX_COUNTER_NAME];
data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:555:26:  [2] (integer) _wtoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		counter_index = (DWORD)_wtoi(counter_text);
data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:575:26:  [2] (integer) _wtoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		counter_index = (DWORD)_wtoi(counter_text);
data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:711:42:  [2] (integer) _wtoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				cpe->szObjectName = get_counter_name(_wtoi(cpe->szObjectName));
data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:713:43:  [2] (integer) _wtoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				cpe->szCounterName = get_counter_name(_wtoi(cpe->szCounterName));
data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/service.c:182:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t	path1[MAX_PATH], path2[MAX_PATH];
data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/service.c:207:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t	execName[MAX_PATH];
data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/service.c:208:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t	regkey[256], *wevent_source;
data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/service.c:237:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t			cmdLine[MAX_PATH];
data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/service.c:285:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t	regkey[256];
data/zabbix-5.0.5+dfsg/src/modules/dummy/dummy.c:158:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	from = atoi(param1);
data/zabbix-5.0.5+dfsg/src/modules/dummy/dummy.c:159:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	to = atoi(param2);
data/zabbix-5.0.5+dfsg/src/zabbix_agent/active.c:370:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		delay = atoi(tmp);
data/zabbix-5.0.5+dfsg/src/zabbix_agent/active.c:386:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			mtime = atoi(tmp);
data/zabbix-5.0.5+dfsg/src/zabbix_agent/active.c:464:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			expression_type = atoi(tmp);
data/zabbix-5.0.5+dfsg/src/zabbix_agent/active.c:481:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			case_sensitive = atoi(tmp);
data/zabbix-5.0.5+dfsg/src/zabbix_agent/active.c:711:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			value[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_agent/active.c:712:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			info[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_agent/cpustat.c:129:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t				cpu[16]; /* 16 is enough to store instance name string (group and index) */
data/zabbix-5.0.5+dfsg/src/zabbix_agent/cpustat.c:130:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				counterPath[PDH_MAX_COUNTER_PATH];
data/zabbix-5.0.5+dfsg/src/zabbix_agent/cpustat.c:379:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		line[1024];
data/zabbix-5.0.5+dfsg/src/zabbix_agent/cpustat.c:422:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (file = fopen(filename, "r")))
data/zabbix-5.0.5+dfsg/src/zabbix_agent/cpustat.c:441:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			idx = atoi(line + 3) + 1;
data/zabbix-5.0.5+dfsg/src/zabbix_agent/cpustat.h:46:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	h_status[MAX_COLLECTOR_HISTORY];
data/zabbix-5.0.5+dfsg/src/zabbix_agent/cpustat.h:48:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	padding0[8 - (MAX_COLLECTOR_HISTORY % 8)];	/* for 8-byte alignment */
data/zabbix-5.0.5+dfsg/src/zabbix_agent/diskdevices.c:129:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(diskdevices->device + i, diskdevices->device + i + 1,
data/zabbix-5.0.5+dfsg/src/zabbix_agent/diskdevices.h:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[32];
data/zabbix-5.0.5+dfsg/src/zabbix_agent/eventlog.c:118:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t	reg_path[MAX_PATH];
data/zabbix-5.0.5+dfsg/src/zabbix_agent/eventlog.c:188:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t	buf[MAX_PATH];
data/zabbix-5.0.5+dfsg/src/zabbix_agent/eventlog.c:320:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		dwMessageId = atoi(pend);
data/zabbix-5.0.5+dfsg/src/zabbix_agent/eventlog.c:786:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*evt_provider, *evt_source, *evt_message, str_logeventid[8];
data/zabbix-5.0.5+dfsg/src/zabbix_agent/eventlog.c:1438:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char		*value, str_logeventid[8];
data/zabbix-5.0.5+dfsg/src/zabbix_agent/eventlog.c:1669:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	else if (MIN_VALUE_LINES > (rate = atoi(maxlines_persec)) || MAX_VALUE_LINES < rate)
data/zabbix-5.0.5+dfsg/src/zabbix_agent/listener.c:120:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&s, (zbx_socket_t *)((zbx_thread_args_t *)args)->args, sizeof(zbx_socket_t));
data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:255:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buf[MAX_LEN_MD5];
data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:393:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t	*path_uni, mount_point[MAX_PATH + 1], fs_type[MAX_PATH + 1];
data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:2266:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&tmp, p1, sizeof(struct st_logfile));
data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:2267:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p1, p2, sizeof(struct st_logfile));
data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:2268:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p2, &tmp, sizeof(struct st_logfile));
data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:2578:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char   		buf[32 * ZBX_KIBIBYTE];		/* buffer must be of size multiple of 4 as some character */
data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:3306:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (MIN_VALUE_LINES > (rate = atoi(p)) ||
data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:3567:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char	buf[ZBX_MAX_UINT64_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:291:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(object_names[object_num].loc_name, object, sizeof(wchar_t) * sz);
data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:303:17:  [2] (integer) _wtoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			idx = (DWORD)_wtoi(loc_name);
data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:315:21:  [2] (integer) _wtoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			idx_eng = (DWORD)_wtoi(eng_name);
data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:878:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(loc_name, object_names[i].loc_name, sz);
data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.c:339:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(PROCSTAT_PTR(base, offset), str, len);
data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.c:403:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(qdst, qsrc, sizeof(zbx_procstat_query_t));
data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.c:753:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(pids->values + pids->values_num, qdata->pids.values,
data/zabbix-5.0.5+dfsg/src/zabbix_agent/stats.c:107:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (NULL == (file = fopen("/proc/cpuinfo", "r")))
data/zabbix-5.0.5+dfsg/src/zabbix_agent/stats.c:389:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(new_diskdevices, diskdevices, old_shm_size);
data/zabbix-5.0.5+dfsg/src/zabbix_agent/zbxconf.c:91:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*p, **pline, error[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_agent/zbxconf.c:160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[MAX_STRING_LEN], counterpath[PDH_MAX_COUNTER_PATH], interval[8];
data/zabbix-5.0.5+dfsg/src/zabbix_agent/zbxconf.c:206:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			period = atoi(interval);
data/zabbix-5.0.5+dfsg/src/zabbix_get/zabbix_get.c:360:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				port = (unsigned short)atoi(zbx_optarg);
data/zabbix-5.0.5+dfsg/src/zabbix_js/zabbix_js.c:114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[4096];
data/zabbix-5.0.5+dfsg/src/zabbix_js/zabbix_js.c:121:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		if (-1 == (fd = open(filename, O_RDONLY)))
data/zabbix-5.0.5+dfsg/src/zabbix_js/zabbix_js.c:219:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				loglevel = atoi(zbx_optarg);
data/zabbix-5.0.5+dfsg/src/zabbix_js/zabbix_js.c:222:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				timeout = atoi(zbx_optarg);
data/zabbix-5.0.5+dfsg/src/zabbix_proxy/housekeeper/housekeeper.c:96:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	minclock = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/zabbix_proxy/housekeeper/housekeeper.c:173:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	sleeptext[25];
data/zabbix-5.0.5+dfsg/src/zabbix_proxy/proxyconfig/proxyconfig.c:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		value[16], *error = NULL;
data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/server_tasks.c:69:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		task = zbx_tm_task_create(taskid, atoi(row[1]), ZBX_TM_STATUS_NEW, atoi(row[2]), atoi(row[3]), 0);
data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/server_tasks.c:69:70:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		task = zbx_tm_task_create(taskid, atoi(row[1]), ZBX_TM_STATUS_NEW, atoi(row[2]), atoi(row[3]), 0);
data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/server_tasks.c:69:84:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		task = zbx_tm_task_create(taskid, atoi(row[1]), ZBX_TM_STATUS_NEW, atoi(row[2]), atoi(row[3]), 0);
data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/server_tasks.c:82:69:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				task->data = zbx_tm_remote_command_result_create(parent_taskid, atoi(row[4]), row[6]);
data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/server_tasks.c:93:59:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				task->data = zbx_tm_data_result_create(parent_taskid, atoi(row[7]), row[9]);
data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/taskmanager.c:102:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	script.port = (0 == atoi(row[2]) ? (char *)"" : row[2]);
data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/taskmanager.c:286:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	switch (data_type = atoi(row[2]))
data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/taskmanager.c:350:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		clock = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/zabbix_proxy/taskmanager/taskmanager.c:351:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ttl = atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/zabbix_sender/win32/zabbix_sender.c:90:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			value[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_sender/zabbix_sender.c:571:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			value[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_sender/zabbix_sender.c:572:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			info[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_sender/zabbix_sender.c:1321:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmp[MAX_BUFFER_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_sender/zabbix_sender.c:1337:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*buffer + buffer_offset, tmp, len);
data/zabbix-5.0.5+dfsg/src/zabbix_sender/zabbix_sender.c:1454:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		else if (NULL == (in = fopen(INPUT_FILE, "r")))
data/zabbix-5.0.5+dfsg/src/zabbix_sender/zabbix_sender.c:1468:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char		hostname[MAX_STRING_LEN], clock[32];
data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:652:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	condition_value = (unsigned char)atoi(condition->value);
data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:794:4:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			atoi(condition->value));
data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:1290:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int	i, condition_value_i = atoi(condition->value);
data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:1621:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	condition_value_i = atoi(condition->value);
data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:1653:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			tmp_int = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:1692:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int	i, condition_value_i = atoi(condition->value);
data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:1743:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	condition_value_i = atoi(condition->value);
data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:1788:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			tmp_int = DOBJECT_STATUS_UP == atoi(row[1]) ? atoi(row[2]) : atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:1788:50:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			tmp_int = DOBJECT_STATUS_UP == atoi(row[1]) ? atoi(row[2]) : atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:1788:65:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			tmp_int = DOBJECT_STATUS_UP == atoi(row[1]) ? atoi(row[2]) : atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:1870:51:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					if (SUCCEED == int_in_list(condition->value, atoi(row[1])))
data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:1874:51:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					if (SUCCEED != int_in_list(condition->value, atoi(row[1])))
data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:2196:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	condition_value = atoi(condition->value);
data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:3016:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		operationtype = (unsigned char)atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:3019:56:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		inventory_mode = (SUCCEED == DBis_null(row[3]) ? 0 : atoi(row[3]));
data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:3369:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char	search[ZBX_MAX_UINT64_LEN + 2];
data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:3370:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char	replace[ZBX_MAX_UINT64_LEN + 2];
data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_manager.c:1809:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char	buf[sizeof(results_num)];
data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_syncer.c:174:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		status = atoi(row[5]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_syncer.c:175:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		attempts = atoi(row[6]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_syncer.c:187:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		source = atoi(row[7]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_syncer.c:188:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		object = atoi(row[8]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_syncer.c:362:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		type = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_syncer.c:367:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		maxsessions = atoi(row[15]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_syncer.c:368:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		maxattempts = atoi(row[16]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_syncer.c:374:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				row[19], row[20], atoi(row[21]));
data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alert_syncer.c:481:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			key[TAG_NAME_LEN * 4 + 1], value[TAG_VALUE_LEN * 4 + 1];
data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alerter.c:161:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		error[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alerter.c:202:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		error[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alerter.c:231:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		error[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:173:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		key[MAX_STRING_LEN], error[ITEM_ERROR_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:365:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			first = atoi(start);
data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:366:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			last = atoi(last_port + 1);
data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:370:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			first = last = atoi(start);
data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:416:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		sql[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:442:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		dcheck.type = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:446:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		dcheck.snmpv3_securitylevel = (unsigned char)atoi(row[5]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:449:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		dcheck.snmpv3_authprotocol = (unsigned char)atoi(row[8]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:450:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		dcheck.snmpv3_privprotocol = (unsigned char)atoi(row[9]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:513:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			ip[INTERFACE_IP_LEN_MAX], *start, *comma, dns[INTERFACE_DNS_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:862:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	else if (0 != atoi(row[0]))
data/zabbix-5.0.5+dfsg/src/zabbix_server/discoverer/discoverer.c:863:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		res = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:115:73:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (NULL != (row = DBfetch(result)) && SUCCEED != DBis_null(row[0]) && atoi(row[0]) > 0)
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:132:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		user_type = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:174:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		perm = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:478:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			if (atoi(row[1]) != 1)
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:805:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		sql[512];	/* do not forget to adjust size if SQLs change */
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:896:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		host->ipmi_authtype = (signed char)atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:897:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		host->ipmi_privilege = (unsigned char)atoi(row[5]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1053:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char			error[ALERT_ERROR_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1063:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		script.type = (unsigned char)atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1076:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			script.execute_on = (unsigned char)atoi(row[5]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1093:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				host.tls_connect = (unsigned char)atoi(row[13]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1095:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				host.ipmi_authtype = (signed char)atoi(row[14]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1096:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				host.ipmi_privilege = (unsigned char)atoi(row[15]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1129:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					script.authtype = (unsigned char)atoi(row[7]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1270:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		severity = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1278:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (MEDIA_STATUS_DISABLED == atoi(row[5]))
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1300:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		else if (MEDIA_TYPE_STATUS_DISABLED == atoi(row[4]))
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1417:44:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		condition.conditiontype	= (unsigned char)atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1418:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		condition.op = (unsigned char)atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1527:80:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (SUCCEED == check_operation_conditions(event, operationid, (unsigned char)atoi(row[3])))
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1531:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			switch (atoi(row[1]))
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1625:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		operationtype = (unsigned char)atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1690:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		operationtype = (unsigned char)atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1803:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char key_short[VALUE_ERRMSG_MAX * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1];
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:1908:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char key_short[VALUE_ERRMSG_MAX * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1];
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:2096:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ack.clock = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:2098:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ack.action = atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:2099:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ack.old_severity = atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:2100:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ack.new_severity = atoi(row[5]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:2589:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		esc_nextcheck = atoi(row[5]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:2607:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		escalation->esc_step = atoi(row[6]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:2608:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		escalation->status = atoi(row[7]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/events.c:755:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				*expression, error[256];
data/zabbix-5.0.5+dfsg/src/zabbix_server/events.c:1563:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		diff->problem_count = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/events.c:2176:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		object = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/history_compress.c:123:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		age = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/housekeeper.c:308:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		min_clock = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/housekeeper.c:423:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		value_type = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/housekeeper.c:684:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			rule->min_clock = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/housekeeper.c:696:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char			buffer[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/housekeeper.c:832:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	filter[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/housekeeper.c:863:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	filter[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/housekeeper/housekeeper.c:1114:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	sleeptext[25];
data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httppoller.c:71:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		res = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:117:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	types[3];
data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:136:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		switch (types[num] = (unsigned char)atoi(row[0]))
data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:266:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	types[3];
data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:286:65:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (ZBX_HTTPITEM_TYPE_RSPCODE != (types[num] = (unsigned char)atoi(row[0])) &&
data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:388:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		type = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:569:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		type = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:650:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		errbuf[CURL_ERROR_SIZE];
data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:721:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		db_httpstep.no = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:737:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		db_httpstep.post_type = atoi(row[8]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:770:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		db_httpstep.follow_redirects = atoi(row[9]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:771:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		db_httpstep.retrieve_mode = atoi(row[10]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:1125:65:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (HTTPTEST_AUTH_NONE != (httptest.httptest.authentication = atoi(row[6])))
data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:1145:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		httptest.httptest.retries = atoi(row[10]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:1159:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		httptest.httptest.verify_peer = atoi(row[14]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httptest.c:1160:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		httptest.httptest.verify_host = atoi(row[15]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				id[IPMI_SENSOR_ID_SZ];
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:168:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(str, id, id_len);
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:346:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	domain_name[IPMI_DOMAIN_NAME_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:386:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			id_str[2 * IPMI_SENSOR_ID_SZ + 1];
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:388:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			id[IPMI_SENSOR_ID_SZ];
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:392:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			full_name[IPMI_SENSOR_NAME_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:408:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(s->id, id, sizeof(id));
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:434:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	id_str[2 * IPMI_SENSOR_ID_SZ + 1];
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:532:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			full_name[IPMI_SENSOR_NAME_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:623:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char			id[IPMI_SENSOR_ID_SZ];
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:624:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char			id_str[2 * IPMI_SENSOR_ID_SZ + 1];
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:693:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			id_str[2 * IPMI_SENSOR_ID_SZ + 1];
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:786:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			id_str[2 * IPMI_SENSOR_ID_SZ + 1];
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:935:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		id_str[2 * IPMI_SENSOR_ID_SZ + 1];
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1016:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	id_str[2 * IPMI_SENSOR_ID_SZ + 1];
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1094:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(c->val, val, sz);
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1142:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	control_name[128];	/* internally defined CONTROL_ID_LEN is 32 in OpenIPMI 2.0.22 */
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1177:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	control_name[128];	/* internally defined CONTROL_ID_LEN is 32 in OpenIPMI 2.0.22 */
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1290:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	entity_name[IPMI_ENTITY_NAME_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1387:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	type[8], str[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1497:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*addrs[2] = {NULL}, *ports[2] = {NULL};
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1499:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			domain_name[11];	/* max int length */
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1580:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	name[IPMI_DOMAIN_NAME_LEN], *domain_name = (char *)cb_data;
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1611:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	domain_name[11];	/* max int length */
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1835:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char 		state_name[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1999:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(c_name, command, sz_c_name);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:182:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	condition->op = (unsigned char)atoi(op);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:431:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*expression, id[ZBX_MAX_UINT64_LEN + 2], *p, error[256];
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:679:55:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			override_operation->operationtype = (unsigned char)atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:680:50:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			override_operation->operator = (unsigned char)atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:683:76:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			override_operation->status = FAIL == DBis_null(row[5]) ? (unsigned char)atoi(row[5]) :
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:686:78:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			override_operation->discover = FAIL == DBis_null(row[6]) ? (unsigned char)atoi(row[6]) :
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:698:78:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		override_operation->severity = FAIL == DBis_null(row[10]) ? (unsigned char)atoi(row[10]) :
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:720:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				(unsigned char)atoi(row[14]) : HOST_INVENTORY_COUNT;
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:834:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		override->step = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:836:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		override->filter.evaltype = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:838:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		override->stop = (unsigned char)atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:1295:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		filter.evaltype = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:182:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (atoi(row[2]) != width)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:185:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (atoi(row[3]) != height)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:194:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((unsigned char)atoi(row[6]) != show_work_period)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:197:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((unsigned char)atoi(row[7]) != show_triggers)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:200:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((unsigned char)atoi(row[8]) != graphtype)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:203:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((unsigned char)atoi(row[9]) != show_legend)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:206:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((unsigned char)atoi(row[10]) != show_3d)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:215:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((unsigned char)atoi(row[13]) != ymin_type)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:220:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((unsigned char)atoi(row[15]) != ymax_type)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:225:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		graph->lastcheck = atoi(row[17]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:226:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		graph->ts_delete = atoi(row[18]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:295:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		gitem->sortorder = atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:1351:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		width = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_graph.c:1352:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		height = atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:292:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		host->lastcheck = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:293:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		host->ts_delete = atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:304:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((char)atoi(row[7]) != ipmi_authtype)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:307:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((unsigned char)atoi(row[8]) != ipmi_privilege)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:316:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (atoi(row[12]) != tls_connect)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:319:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (atoi(row[13]) != tls_accept)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:337:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			host->inventory_mode_orig = (char)atoi(row[11]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:962:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		group->lastcheck = atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:963:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		group->ts_delete = atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:1420:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pair.second = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3052:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		interface->type = (unsigned char)atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3053:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		interface->main = (unsigned char)atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3054:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		interface->useip = (unsigned char)atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3312:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						interface_type, (unsigned char)atoi(row[4]),
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3313:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						(unsigned char)atoi(row[5]), row[6], row[7], row[8],
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3314:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						(unsigned char)atoi(row[9]), (unsigned char)atoi(row[10]), row[11],
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3314:51:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						(unsigned char)atoi(row[9]), (unsigned char)atoi(row[10]), row[11],
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3315:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						row[12], (unsigned char)atoi(row[13]), row[14], row[15],
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3316:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						(unsigned char)atoi(row[16]), (unsigned char)atoi(row[17]), row[18]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3316:52:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						(unsigned char)atoi(row[16]), (unsigned char)atoi(row[17]), row[18]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3321:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						interface_type, (unsigned char)atoi(row[4]),
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3322:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						(unsigned char)atoi(row[5]), row[6], row[7], row[8],
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3424:58:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			type = get_interface_type_by_item_type((unsigned char)atoi(row[1]));
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3580:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ipmi_authtype = (char)atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:3637:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			inventory_mode_proto = (char)atoi(row[5]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:627:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		item->lastcheck = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:628:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		item->ts_delete = atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:636:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((unsigned char)atoi(row[6]) != item_prototype->type)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:639:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((unsigned char)atoi(row[7]) != item_prototype->value_type)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:676:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((unsigned char)atoi(row[19]) != item_prototype->authtype)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:718:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((unsigned char)atoi(row[33]) != item_prototype->follow_redirects)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:721:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((unsigned char)atoi(row[34]) != item_prototype->post_type)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:730:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((unsigned char)atoi(row[37]) != item_prototype->retrieve_mode)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:733:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((unsigned char)atoi(row[38]) != item_prototype->request_method)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:736:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((unsigned char)atoi(row[39]) != item_prototype->output_format)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:748:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((unsigned char)atoi(row[43]) != item_prototype->verify_peer)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:751:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((unsigned char)atoi(row[44]) != item_prototype->verify_host)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:754:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((unsigned char)atoi(row[46]) != item_prototype->allow_traps)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:828:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		preproc_op->step = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:829:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		preproc_op->type = atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:831:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		preproc_op->error_handler = atoi(row[5]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:894:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		key_short[VALUE_ERRMSG_MAX * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1];
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:1309:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		err[MAX_STRING_LEN], *errmsg = NULL;
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:1310:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		param1[ITEM_PREPROC_PARAMS_LEN * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1], *param2;
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:1587:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char key_short[VALUE_ERRMSG_MAX * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1];
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:1682:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char key_short[VALUE_ERRMSG_MAX * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1];
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:1865:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				err[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:4307:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		application->lastcheck = atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:4308:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		application->ts_delete = atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:4616:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			if (ZBX_FLAG_DISCOVERY_CREATED != atoi(row[2]))
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:5031:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		preproc_op->step = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:5032:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		preproc_op->type = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:5034:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		preproc_op->error_handler = atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_protocol.c:322:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(size, message.data, sizeof(zbx_uint64_t));
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_trigger.c:426:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((unsigned char)atoi(row[4]) != trigger_prototype->type)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_trigger.c:429:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		trigger->priority = (unsigned char)atoi(row[5]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_trigger.c:431:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((unsigned char)atoi(row[9]) != trigger_prototype->recovery_mode)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_trigger.c:434:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((unsigned char)atoi(row[10]) != trigger_prototype->correlation_mode)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_trigger.c:437:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if ((unsigned char)atoi(row[12]) != trigger_prototype->manual_close)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_trigger.c:448:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		trigger->lastcheck = atoi(row[14]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_trigger.c:449:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		trigger->ts_delete = atoi(row[15]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_trigger.c:896:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buffer[ZBX_MAX_UINT64_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_trigger.c:1032:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	err[64];
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_trigger.c:2298:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[ZBX_MAX_UINT64_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/odbc/odbc.c:164:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		driver_name[MAX_STRING_LEN + 1], driver_ver[MAX_STRING_LEN + 1],
data/zabbix-5.0.5+dfsg/src/zabbix_server/odbc/odbc.c:512:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		buffer[MAX_STRING_LEN + 1];
data/zabbix-5.0.5+dfsg/src/zabbix_server/odbc/odbc.c:631:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		str[MAX_STRING_LEN], *p;
data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.c:278:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			svc_type = (unsigned char)atoi(row[5]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.c:283:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					port = (unsigned short)atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.c:289:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					port = (unsigned short)atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.c:351:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					if (ZBX_DISCOVERY_VALUE == (host_source = atoi(row[6])))
data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.c:402:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					if (ZBX_DISCOVERY_VALUE == (name_source = atoi(row[7])))
data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.c:489:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			port = (unsigned short)atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.c:490:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			flags_int = atoi(row[5]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.c:508:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			tls_accepted = atoi(row[6]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.c:546:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char	psk_identity[HOST_TLS_PSK_IDENTITY_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/zabbix_server/operations.c:547:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char	psk[HOST_TLS_PSK_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/zabbix_server/pinger/pinger.c:412:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			error[MAX_STRING_LEN], *addr = NULL;
data/zabbix-5.0.5+dfsg/src/zabbix_server/pinger/pinger.c:518:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			error[ITEM_ERROR_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_calculated.c:172:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*buf, replace[16], *errstr = NULL;
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_calculated.c:316:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			error[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_external.c:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		error[ITEM_ERROR_LEN_MAX], *cmd = NULL, *buf = NULL;
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_http.c:213:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			url[ITEM_URL_LEN_MAX], errbuf[CURL_ERROR_SIZE], *error = NULL, *headers, *line, *buffer;
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_internal.c:108:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char		buf[16];
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_java.c:133:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		error[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:418:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			addr[128];
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:611:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static char	localname[64];
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:645:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:688:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(strval_dyn, var->val.string, var->val_len);
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:748:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	buffer[21];
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:813:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	printed_oid[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:970:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(oid_k + 1, var_oid, var_len * sizeof(oid));
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1018:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			oid_index[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1058:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(anOID, rootOID, rootOID_len * sizeof(oid));
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1219:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy((char *)anOID, (char *)var->name, var->name_length * sizeof(oid));
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1358:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char	sent_oid[ITEM_SNMP_OID_LEN_MAX], received_oid[ITEM_SNMP_OID_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1762:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			oid_translated[ITEM_SNMP_OID_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1830:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		to_verify_oids[MAX_SNMP_ITEMS][ITEM_SNMP_OID_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1831:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	query_and_ignore_type[MAX_SNMP_ITEMS];
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1832:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		index_oids[MAX_SNMP_ITEMS][ITEM_SNMP_OID_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1833:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		index_values[MAX_SNMP_ITEMS][ITEM_SNMP_OID_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1834:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		oids_translated[MAX_SNMP_ITEMS][ITEM_SNMP_OID_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1846:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	method[8];
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:2030:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	oids_translated[MAX_SNMP_ITEMS][ITEM_SNMP_OID_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:2070:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			error[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_ssh.c:91:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[MAX_BUFFER_LEN], *userauthlist, *publickey = NULL, *privatekey = NULL, *ssherr, *output;
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_ssh.c:328:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[MAX_BUFFER_LEN], userauthlist[64];
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/poller.c:426:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			name[MAX_STRING_LEN], value[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.c:51:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		triggers_num = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.c:309:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		event.source = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.c:310:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		event.object = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.c:312:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		event.clock = atoi(row[4]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.c:313:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		event.value = atoi(row[5]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.c:314:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		event.acknowledged = atoi(row[6]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.c:315:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		event.ns = atoi(row[7]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:202:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	buffer[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:501:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	params_raw[ITEM_PREPROC_PARAMS_LEN * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1];
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:775:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		pattern[ITEM_PREPROC_PARAMS_LEN * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1];
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:946:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[32], *ptr;
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:1073:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		min[ITEM_PREPROC_PARAMS_LEN * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1], *max;
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:1432:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		pattern[ITEM_PREPROC_PARAMS_LEN * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1], *output;
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:1632:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	pattern[ITEM_PREPROC_PARAMS_LEN * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1], *output, *value_out = NULL,
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:1753:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char	num_buf[ZBX_MAX_UINT64_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:1819:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(delim, p, del_sz);
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:1846:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(delim, params, delim_sz);
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:1864:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(quote, params, quote_sz);
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:2047:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		*new_string, search_str[ITEM_PREPROC_PARAMS_LEN * ZBX_MAX_BYTES_IN_UTF8_CHAR + 1],
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_manager.c:622:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(target, source, sizeof(zbx_preproc_item_value_t));
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_manager.c:630:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(target->ts, source->ts, sizeof(zbx_timespec_t));
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_manager.c:686:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&request->value, value, sizeof(zbx_preproc_item_value_t));
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_worker.c:66:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*value_str, value_desc, len);
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_worker.c:67:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*value_str + len, "...", ZBX_CONST_STRLEN("...") + 1);
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_worker.c:72:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*value_str, value_desc, len + 1);
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preprocessing.c:87:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(offset, (zbx_uint32_t *)&field_size, sizeof(zbx_uint32_t));
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preprocessing.c:89:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(offset + sizeof(zbx_uint32_t), fields[i].value, field_size);
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preprocessing.c:93:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(offset, fields[i].value, field_size);
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preprocessing.c:102:60:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				field_size = (NULL != fields[i].value) ? strlen((const char *)fields[i].value) + 1 : 0;
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preprocessing.c:1051:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&size, message.data, sizeof(zbx_uint64_t));
data/zabbix-5.0.5+dfsg/src/zabbix_server/proxypoller/proxypoller.c:475:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&proxy_old, &proxy, sizeof(DC_PROXY));
data/zabbix-5.0.5+dfsg/src/zabbix_server/snmptrapper/snmptrapper.c:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			error[ITEM_ERROR_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/zabbix_server/snmptrapper/snmptrapper.c:505:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (-1 == (trap_fd = open(CONFIG_SNMPTRAP_FILE, O_RDONLY)))
data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/proxy_tasks.c:75:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		task = zbx_tm_task_create(taskid, atoi(row[1]), ZBX_TM_STATUS_NEW, atoi(row[2]), atoi(row[3]), 0);
data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/proxy_tasks.c:75:70:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		task = zbx_tm_task_create(taskid, atoi(row[1]), ZBX_TM_STATUS_NEW, atoi(row[2]), atoi(row[3]), 0);
data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/proxy_tasks.c:75:84:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		task = zbx_tm_task_create(taskid, atoi(row[1]), ZBX_TM_STATUS_NEW, atoi(row[2]), atoi(row[3]), 0);
data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/proxy_tasks.c:89:55:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				task->data = (void *)zbx_tm_remote_command_create(atoi(row[4]), row[12], atoi(row[5]),
data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/proxy_tasks.c:89:78:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				task->data = (void *)zbx_tm_remote_command_create(atoi(row[4]), row[12], atoi(row[5]),
data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/proxy_tasks.c:90:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						atoi(row[6]), atoi(row[7]), row[8], row[9], row[10], row[11],
data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/proxy_tasks.c:90:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						atoi(row[6]), atoi(row[7]), row[8], row[9], row[10], row[11],
data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/proxy_tasks.c:112:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						atoi(row[19]));
data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/taskmanager.c:213:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			status = atoi(row[0]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/taskmanager.c:418:36:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			if (ZBX_TM_STATUS_INPROGRESS == atoi(row[1]))
data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/taskmanager.c:589:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		data_type = atoi(row[1]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/taskmanager.c:677:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		clock = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/taskmanager.c:678:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ttl = atoi(row[3]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/timer/timer.c:299:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pair.second = atoi(row[2]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/active.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		dns[INTERFACE_DNS_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/active.c:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		ip_addr[INTERFACE_IP_LEN_MAX];
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/active.c:215:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (0 == ((unsigned int)atoi(row[2]) & sock->connection_type))
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/active.c:281:71:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		old_port_v = (unsigned short)(SUCCEED == DBis_null(old_port)) ? 0 : atoi(old_port);
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/active.c:282:88:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		old_flag_v = (zbx_conn_flags_t)(SUCCEED == DBis_null(old_flag)) ? ZBX_CONN_DEFAULT : atoi(old_flag);
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/active.c:292:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (HOST_STATUS_MONITORED != atoi(row[1]))
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/active.c:553:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			host[HOST_HOST_LEN_MAX], tmp[MAX_STRING_LEN], ip[INTERFACE_IP_LEN_MAX],
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/active.c:736:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char	buffer[32];
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/nodecommand.c:65:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			if (SUCCEED == (ret = atoi(row[0])))
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/nodecommand.c:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		execute_on_s[MAX_ID_LEN + 1], hostid_s[MAX_ID_LEN + 1], proxy_hostid_s[MAX_ID_LEN + 1];
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/nodecommand.c:161:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		error[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:323:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			type[MAX_STRING_LEN], sessionid[MAX_STRING_LEN], limit_str[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:482:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tmp[ZBX_MAX_UINT64_LEN + 1], sessionid[MAX_STRING_LEN], *sendto = NULL, *subject = NULL,
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:560:62:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	size = zbx_alerter_serialize_alert_send(&data, mediatypeid, atoi(row[0]), row[1], row[2], row[3], row[4],
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:562:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			smtp_authentication, row[13], atoi(row[14]), atoi(row[15]), row[16], content_type, row[18],
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:562:49:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			smtp_authentication, row[13], atoi(row[14]), atoi(row[15]), row[16], content_type, row[18],
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:654:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (atoi(row[0]) + ZBX_USER_ONLINE_TIME < now)
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:944:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		type[MAX_STRING_LEN], sessionid[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:1026:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		type[MAX_STRING_LEN], error[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:1045:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char			from_str[ZBX_MAX_UINT64_LEN + 1], to_str[ZBX_MAX_UINT64_LEN + 1];
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:1124:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char			value[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:1237:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char			value_dec[MAX_BUFFER_LEN], lastlogsize[ZBX_MAX_UINT64_LEN], timestamp[11],
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:1257:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			av.timestamp = atoi(timestamp);
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:1259:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			av.severity = atoi(severity);
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper.c:1336:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&s, (zbx_socket_t *)((zbx_thread_args_t *)args)->args, sizeof(zbx_socket_t));
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_expressions_evaluate.c:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buffer[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_expressions_evaluate.c:79:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char			evaluate_error[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_item_test.c:121:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmp[ZBX_MAX_UINT64_LEN + 1];
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_item_test.c:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tmp[MAX_STRING_LEN + 1], **pvalue;
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_item_test.c:281:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		item.host.ipmi_authtype = atoi(tmp);
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_item_test.c:283:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		item.host.ipmi_authtype = atoi(DBget_field(table_hosts, "ipmi_authtype")->default_value);
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_item_test.c:382:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			sessionid[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_item_test.c:386:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tmp[MAX_ID_LEN + 1];
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_preproc.c:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			buffer[MAX_STRING_LEN], *step_params = NULL, *error_handler_params = NULL;
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_preproc.c:78:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*value_type = atoi(buffer);
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_preproc.c:155:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		step_type = atoi(buffer);
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_preproc.c:162:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		error_handler = atoi(buffer);
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_preproc.c:226:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			*values[2] = {NULL, NULL}, *preproc_error = NULL;
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:1811:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		xml[MAX_STRING_LEN], *error_object = NULL, *username_esc = NULL, *password_esc = NULL;
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:1921:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmp[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:1971:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	*token_esc, post[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:2069:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmp[MAX_STRING_LEN], *value = NULL, *id_esc;
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:2148:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tmp[MAX_STRING_LEN], *group = NULL, *key = NULL, *rollup = NULL, *stats = NULL,
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:2540:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmp[MAX_STRING_LEN], props[MAX_STRING_LEN], *vmid_esc;
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:2591:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	const char	*uuid_xpath[3] = {NULL, ZBX_XPATH_VM_UUID(), ZBX_XPATH_VM_INSTANCE_UUID()};
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:2659:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tmp[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:2708:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tmp[MAX_STRING_LEN], *uuid = NULL, *name = NULL, *path, *id_esc, *value, *error = NULL;
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:2852:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmp[MAX_STRING_LEN], props[MAX_STRING_LEN], *hvid_esc;
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:2973:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmp[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:3082:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tmp[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:3476:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				tmp[MAX_STRING_LEN * 2];
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:3551:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmp[MAX_STRING_LEN];
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:3603:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		tmp[MAX_STRING_LEN], *event_session_esc;
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:3654:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmp[MAX_STRING_LEN], *event_session_esc;
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:3699:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmp[MAX_STRING_LEN], *event_session_esc;
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:3892:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		key = (unsigned int) atoi(value);
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:4056:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			tmp[MAX_STRING_LEN], *value;
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:4094:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	xml_event.id = (unsigned int) atoi(value);
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:4313:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	tmp[MAX_STRING_LEN], *clusterid_esc;
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:4356:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			xpath[MAX_STRING_LEN], *name;
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:4486:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (-1 == atoi(val))
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:4573:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	service->major_version = atoi(version);
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:4583:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	service->minor_version = atoi(strlen(UNPARSED_SERVICE_MAJOR_VERSION_DELIM) + version_without_major);
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:4747:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			msg[MAX_STRING_LEN / 8];
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:5268:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char	st_str[ZBX_XML_DATETIME];
data/zabbix-5.0.5+dfsg/include/common.h:52:8:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
#ifdef strncpy
data/zabbix-5.0.5+dfsg/include/common.h:53:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
#	undef strncpy
data/zabbix-5.0.5+dfsg/include/common.h:55:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
#define strncpy		ERROR_DO_NOT_USE_STRNCPY_FUNCTION_TRY_TO_USE_ZBX_STRLCPY
data/zabbix-5.0.5+dfsg/include/common.h:67:8:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
#ifdef strncat
data/zabbix-5.0.5+dfsg/include/common.h:68:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
#	undef strncat
data/zabbix-5.0.5+dfsg/include/common.h:70:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
#define strncat		ERROR_DO_NOT_USE_STRNCAT_FUNCTION_TRY_TO_USE_ZBX_STRLCAT
data/zabbix-5.0.5+dfsg/include/comms.h:39:44:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#	define ZBX_TCP_READ(s, b, bl)		((ssize_t)read((s), (b), (bl)))
data/zabbix-5.0.5+dfsg/include/comms.h:126:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define zbx_tcp_send(s, d)				zbx_tcp_send_ext((s), (d), strlen(d), ZBX_TCP_PROTOCOL, 0)
data/zabbix-5.0.5+dfsg/include/comms.h:127:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define zbx_tcp_send_to(s, d, timeout)			zbx_tcp_send_ext((s), (d), strlen(d), ZBX_TCP_PROTOCOL, timeout)
data/zabbix-5.0.5+dfsg/include/comms.h:129:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define zbx_tcp_send_raw(s, d)				zbx_tcp_send_ext((s), (d), strlen(d), 0, 0)
data/zabbix-5.0.5+dfsg/include/zbxserialize.h:26:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str##_len = (NULL != str ? strlen(str) + 1 : 0);	\
data/zabbix-5.0.5+dfsg/include/zbxserialize.h:30:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str_len = (NULL != str ? strlen(str) + 1 : 0);		\
data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/algodefs.c:262:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return ZBX_DEFAULT_STRING_HASH_ALGO(data, strlen((const char *)data), ZBX_DEFAULT_HASH_SEED);
data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/evaluate.c:977:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (0 == strlen(res.data.str))
data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/evaluate.c:1113:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (1 < strlen(in) && '-' == in[0])
data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/prediction.c:875:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	else if (0 == strncmp(fit_str, "polynomial", strlen("polynomial")))
data/zabbix-5.0.5+dfsg/src/libs/zbxalgo/prediction.c:879:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (SUCCEED != is_uint_range(fit_str + strlen("polynomial"), k, 1, 6))
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/alias.c:102:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len_name = strlen(alias->name);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/alias.c:109:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len_value = strlen(alias->value);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/file.c:113:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (0 >= (nbytes = read(fd, buf, count)))
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/iprange.c:61:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(address);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:633:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			filename, line, (zbx_fs_size_t)(strlen(str) + 1));
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:960:73:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while  (SUCCEED == time_period_parse(&tp, period, (NULL == next ? (int)strlen(period) : (int)(next - period))))
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:1925:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	*len = NULL == delim ? (int)strlen(str) : delim - str;
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:1964:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				NULL == (delim = strchr(str, ';')) ? (int)strlen(str) : (int)(delim - str), str);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:2001:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					NULL == (delim = strchr(str, ';')) ? (int)strlen(str) : (int)(delim - str)))
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:2007:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					NULL == delim ? (int)strlen(str) : (int)(delim - str), str);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:2028:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					NULL == (delim = strchr(str, ';')) ? (int)strlen(str) : (int)(delim - str)))
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:2036:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					NULL == delim ? (int)strlen(str) : (int)(delim - str), str);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:2099:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					(NULL == delim ? (int)strlen(interval_str) : (int)(delim - interval_str))) ||
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:2118:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					(NULL == delim ? (int)strlen(interval_str) : (int)(delim - interval_str))))
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:2145:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(NULL == delim ? (int)strlen(interval_str) : (int)(delim - interval_str)),
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:2596:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			ptr = list + strlen(list);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:3346:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz = strlen(str);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/misc.c:3382:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz = strlen(str) - 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/setproctitle.c:89:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		arg_next = argv[i] + strlen(argv[i]) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/setproctitle.c:118:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			arg_next = environ[i] + strlen(environ[i]) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/setproctitle.c:144:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(argv_int[i - 1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/setproctitle.c:168:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len0 = strlen(argv[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/setproctitle.c:217:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		start_pos = strlen(argv_int[0]);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/setproctitle.c:219:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		start_pos = strlen(ps_buf);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/setproctitle.c:240:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		pstat(PSTAT_SETCMD, pst, strlen(ps_buf), 0, 0);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:93:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		pos = ZBX_CONST_STRLEN(ZBX_SPACE1) + strlen(progname);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:99:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(*p);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:353:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	zbx_strncpy_alloc(str, alloc_len, offset, src, strlen(src));
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:377:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = (long)strlen(sub_str1);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:385:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	diff = (long)strlen(sub_str2) - len;
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:388:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	new_str = (char *)zbx_malloc(new_str, (size_t)(strlen(str) + count*diff + 1)*sizeof(char));
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:496:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (p = str + strlen(str) - 1; p >= str && NULL != strchr(charlist, *p); p--)
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:812:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len_dest = strlen(dest);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:813:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len_src = strlen(src);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1254:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz_h = strlen(haystack);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:1255:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz_n = strlen(needle);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:2109:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz = strlen(text);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:2398:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(cesu8);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:2518:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	src_size = strlen(src);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:2519:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	delim_size = strlen(delim);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:2649:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz_value = strlen(value);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:2654:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sz_data = *r + strlen(*data + *r);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:3009:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = (int)strlen(context) + 2 + quotes;
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:3220:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (0 != (sz_src = strlen(*param)) && '\\' == (*param)[sz_src - 1])
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:3263:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	params_len = strlen(params) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:5359:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(value);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/str.c:5529:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		right_size = strlen(src) - (size_t)(delimiter_ptr - src);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/zbxgetopt.c:392:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if ((unsigned) (s - nextchar) == strlen (p->name))
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/zbxgetopt.c:419:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          nextchar += strlen (nextchar);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/zbxgetopt.c:429:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          nextchar += strlen (nextchar);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/zbxgetopt.c:459:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  nextchar += strlen (nextchar);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/zbxgetopt.c:476:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  nextchar += strlen (nextchar);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommon/zbxgetopt.c:480:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          nextchar += strlen (nextchar);
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/telnet.c:360:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	telnet_socket_write(socket_fd, username, strlen(username));
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/telnet.c:380:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	telnet_socket_write(socket_fd, password, strlen(password));
data/zabbix-5.0.5+dfsg/src/libs/zbxcomms/telnet.c:422:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	offset_lf = strlen(command);
data/zabbix-5.0.5+dfsg/src/libs/zbxcommshigh/comms.c:69:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (FAIL == (ret = zbx_tcp_send_ext(sock, json.buffer, strlen(json.buffer), protocol, timeout)))
data/zabbix-5.0.5+dfsg/src/libs/zbxconf/cfg.c:409:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(line);
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:1386:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (0 == (len = strlen(buf)))
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:2417:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		my_psk_identity_len = strlen(my_psk_identity);
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:2848:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		my_psk_identity_len = strlen(my_psk_identity);
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:3637:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			psk_identity_len_for_cb = (NULL == tls_arg1 ? 0 : strlen(tls_arg1));
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:4673:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	attr->psk_identity_len = strlen(attr->psk_identity);
data/zabbix-5.0.5+dfsg/src/libs/zbxcrypto/tls.c:4687:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	attr->psk_identity_len = strlen(attr->psk_identity);
data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:638:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(text *)user, (ub4)(NULL != user ? strlen(user) : 0),
data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:639:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(text *)password, (ub4)(NULL != password ? strlen(password) : 0),
data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:640:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				(text *)connect, (ub4)strlen(connect),
data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:1143:71:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return OCIStmtPrepare(oracle.stmthp, oracle.errhp, (text *)sql, (ub4)strlen((char *)sql), (ub4)OCI_NTV_SYNTAX,
data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:1314:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				sizes[i] = strlen(rows[i][position].str);
data/zabbix-5.0.5+dfsg/src/libs/zbxdb/db.c:1650:72:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		err = OCIStmtPrepare(result->stmthp, oracle.errhp, (text *)sql, (ub4)strlen((char *)sql),
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbcache.c:3493:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	item_value->value.value_str.len = strlen(value_orig) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:115:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(source) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:597:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				REFCOUNT_FIELD_SIZE + strlen(str) + 1, REFCOUNT_FIELD_SIZE);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:5780:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hash = ZBX_DEFAULT_STRING_HASH_ALGO(item_hk->key, strlen(item_hk->key), hash);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:5799:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return ZBX_DEFAULT_STRING_HASH_ALGO(host_h->host, strlen(host_h->host), ZBX_DEFAULT_HASH_SEED);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:5836:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hash = ZBX_DEFAULT_STRING_HASH_ALGO(hmacro_hm->macro, strlen(hmacro_hm->macro), hash);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:5878:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return ZBX_DEFAULT_STRING_HASH_ALGO(interface_addr->addr, strlen(interface_addr->addr), ZBX_DEFAULT_HASH_SEED);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:6021:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return ZBX_DEFAULT_STRING_HASH_ALGO(psk_i->tls_psk_identity, strlen(psk_i->tls_psk_identity),
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:6054:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return ZBX_DEFAULT_STRING_HASH_ALGO(session->token, strlen(session->token), hash);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:6512:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(dc_host->tls_dc_psk->tls_psk_identity) != attr.psk_identity_len ||
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:6984:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz_function = strlen(src_function->function) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:6985:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz_parameter = strlen(src_function->parameter) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:9900:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (sz != strlen(value))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:11579:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(parent_group->name);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbconfig.c:12733:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf_alloc = params_len = strlen(params);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/dbsync.c:62:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				REFCOUNT_FIELD_SIZE + strlen(str) + 1, REFCOUNT_FIELD_SIZE);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/valuecache.c:1027:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(str) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxdbcache/valuecache.c:1075:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			freed = strlen(str) + REFCOUNT_FIELD_SIZE + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:109:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (NULL != value && 0 == strlen(value))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:1928:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sz = strlen(host_name_sample);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/db.c:3515:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		bytes_num = strlen(text);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c:73:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ('/' == export_dir[strlen(export_dir) - 1])
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/export.c:74:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		export_dir[strlen(export_dir) - 1] = '\0';
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:217:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(proxy->tls_psk_identity) != attr.psk_identity_len ||
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:304:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(host->tls_psk_identity) != attr.psk_identity_len ||
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2467:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len1 = strlen(row[5]) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:2468:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len2 = strlen(row[7]) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:3783:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (ZBX_DATA_SESSION_TOKEN_SIZE != (token_len = strlen(token)))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/proxy.c:4660:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (ZBX_DATA_SESSION_TOKEN_SIZE != (token_len = strlen(value)))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbhigh/template_item.c:480:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(srcid);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2010.c:80:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			pnext = params + strlen(params);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2010.c:930:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		key_len = strlen(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2010.c:936:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		else if (ITEM_USERNAME_LEN < strlen(user))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2010.c:938:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		else if (ITEM_PASSWORD_LEN < strlen(password))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_2050.c:809:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			end = row[1] + strlen(row[1]);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3010.c:885:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		memmove(expression + cut->l, expression + cut->r + 1, strlen(expression + cut->r + 1) + 1);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3030.c:872:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (0 != strlen(row[1]))
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_3050.c:1350:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		current_len = strlen(unquoted_parameter);
data/zabbix-5.0.5+dfsg/src/libs/zbxdbupgrade/dbupgrade_4000.c:64:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	newmacro_len = strlen(newmacro);
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duk_config.h:2184:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define DUK_STRLEN       strlen
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3817:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3820:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3823:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3826:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3829:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3832:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3835:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3838:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3841:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3844:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3847:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3850:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3853:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3856:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3859:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3862:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3865:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3868:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3871:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3874:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3877:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3880:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3883:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3886:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3889:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3892:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3895:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3898:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3901:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3904:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3907:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3910:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3913:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3916:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3919:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3922:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3925:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3928:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3931:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3934:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3937:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3940:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3943:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3946:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/duktape.c:3949:8:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
#error mismatch in token defines
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/embed.c:368:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(script);
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/global.c:47:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str_base64_encode_dyn(str, &b64str, (int)strlen(str));
data/zabbix-5.0.5+dfsg/src/libs/zbxembed/global.c:75:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buffer_size = (int)strlen(str) * 3 / 4 + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxexec/execute.c:456:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		while (0 < (rc = read(fd, tmp_buf, sizeof(tmp_buf) - 1)) && MAX_EXECUTE_OUTPUT_LEN > offset + rc)
data/zabbix-5.0.5+dfsg/src/libs/zbxhttp/punycode.c:252:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	codepoints = (zbx_uint32_t *)zbx_malloc(NULL, strlen(text) * sizeof(zbx_uint32_t));
data/zabbix-5.0.5+dfsg/src/libs/zbxhttp/punycode.c:358:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	url_alloc = url_len = strlen(*url) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxhttp/punycode.c:360:83:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	zbx_replace_mem_dyn(url, &url_alloc, &url_len, domain - *url, ptr - domain, iri, strlen(iri));
data/zabbix-5.0.5+dfsg/src/libs/zbxhttp/urlencode.c:41:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buffer = (char *)zbx_malloc(NULL, strlen(source) * 3 + 1);
data/zabbix-5.0.5+dfsg/src/libs/zbxhttp/urlencode.c:81:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	char		*target, *buffer = (char *)zbx_malloc(NULL, strlen(source) + 1);
data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:187:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (ZBX_KIBIBYTE > strlen(out))
data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:193:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(p) >= strlen(dst) && 0 == strncmp(p, dst, strlen(dst)))
data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:193:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(p) >= strlen(dst) && 0 == strncmp(p, dst, strlen(dst)))
data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:193:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(p) >= strlen(dst) && 0 == strncmp(p, dst, strlen(dst)))
data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:213:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (ZBX_KIBIBYTE > strlen(out) && 0 != strlen(out))
data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:213:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (ZBX_KIBIBYTE > strlen(out) && 0 != strlen(out))
data/zabbix-5.0.5+dfsg/src/libs/zbxicmpping/icmpping.c:248:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				ZBX_KIBIBYTE > strlen(out) && NULL != strstr(out, dst)) || TIMEOUT_ERROR == ret)
data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:122:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	path_len = strlen(service_name);
data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:236:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while (-1 == (n = read(fd, buffer + *read_size, size - *read_size)))
data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:1478:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ipc_path_root_len = strlen(path);
data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:1535:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	mode = umask(077);
data/zabbix-5.0.5+dfsg/src/libs/zbxipcservice/ipcservice.c:1592:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(mode);
data/zabbix-5.0.5+dfsg/src/libs/zbxjson/json.c:396:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len_data = strlen(data);
data/zabbix-5.0.5+dfsg/src/libs/zbxlog/log.c:302:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (MAX_STRING_LEN <= strlen(filename))
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:110:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			4 <= strlen(*buf) &&
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:308:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str_base64_encode_dyn(localbody, &base64, strlen(localbody));
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:448:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (0 != strncmp(response, OK_220, strlen(OK_220)))
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:460:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (-1 == write(s.socket, cmd, strlen(cmd)))
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:474:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (0 != strncmp(response, OK_250, strlen(OK_250)))
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:487:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (-1 == write(s.socket, cmd, strlen(cmd)))
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:499:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (0 != strncmp(response, OK_250, strlen(OK_250)))
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:512:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (-1 == write(s.socket, cmd, strlen(cmd)))
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:525:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (0 != strncmp(response, OK_250, strlen(OK_250)) && 0 != strncmp(response, OK_251, strlen(OK_251)))
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:525:88:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (0 != strncmp(response, OK_250, strlen(OK_250)) && 0 != strncmp(response, OK_251, strlen(OK_251)))
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:536:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (-1 == write(s.socket, cmd, strlen(cmd)))
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:548:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (0 != strncmp(response, OK_354, strlen(OK_354)))
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:555:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	err = write(s.socket, cmdp, strlen(cmdp));
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:569:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (-1 == write(s.socket, cmd, strlen(cmd)))
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:581:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (0 != strncmp(response, OK_250, strlen(OK_250)))
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:591:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (-1 == write(s.socket, cmd, strlen(cmd)))
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/email.c:702:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	payload_status.payload_len = strlen(payload_status.payload);
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/sms.c:33:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(str);
data/zabbix-5.0.5+dfsg/src/libs/zbxmedia/sms.c:166:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		while (0 < (nbytes = read(fd, ebuf, buffer + sizeof(buffer) - 1 - ebuf)))
data/zabbix-5.0.5+dfsg/src/libs/zbxmemory/memalloc.c:596:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size -= strlen(descr) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxmemory/memalloc.c:597:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	base = (void *)((char *)base + strlen(descr) + 1);
data/zabbix-5.0.5+dfsg/src/libs/zbxmemory/memalloc.c:601:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size -= strlen(param) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxmemory/memalloc.c:602:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	base = (void *)((char *)base + strlen(param) + 1);
data/zabbix-5.0.5+dfsg/src/libs/zbxmemory/memalloc.c:813:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size += strlen(descr) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxmemory/memalloc.c:814:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size += strlen(param) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxnix/daemon.c:361:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(0002);
data/zabbix-5.0.5+dfsg/src/libs/zbxnix/fatal.c:347:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					line[strlen(line) - 1] = '\0'; /* remove trailing '\n' */
data/zabbix-5.0.5+dfsg/src/libs/zbxprometheus/zbxprometheus.c:321:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		return strlen(data + pos) + pos;
data/zabbix-5.0.5+dfsg/src/libs/zbxprometheus/zbxprometheus.c:1090:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(data + pos);
data/zabbix-5.0.5+dfsg/src/libs/zbxprometheus/zbxprometheus.c:1338:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			loc->r = strlen(data + pos) + pos - 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxprometheus/zbxprometheus.c:1430:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(data + pos);
data/zabbix-5.0.5+dfsg/src/libs/zbxprometheus/zbxprometheus.c:1477:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		error_alloc = (NULL == *error ? 0 : strlen(*error) + 1);
data/zabbix-5.0.5+dfsg/src/libs/zbxregexp/zbxregexp.c:248:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (0 <= (r = pcre_exec(regexp->pcre_regexp, pextra, string, strlen(string), flags, 0, ovector, ovecsize)))
data/zabbix-5.0.5+dfsg/src/libs/zbxregexp/zbxregexp.c:477:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strncpy_alloc(&ptr, &size, &offset, pstart, strlen(pstart), limit);
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/evalfunc.c:2365:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		zbx_snprintf(*value, strlen(*value) + 1, ZBX_FS_UI64, last_uint64 & (zbx_uint64_t)mask);
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/evalfunc.c:3314:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(value) + 1 + MAX_BUFFER_LEN;
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:2517:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					strlen(macro) - ZBX_CONST_STRLEN(MVAR_EVENT_TAGS_PREFIX) - 1, &name))
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:2763:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	replace_to_len = strlen(*replace_to);
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:2921:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	data_alloc = data_len = strlen(*data) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:4673:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					token.loc.r - token.loc.l + 1, replace_to, strlen(replace_to));
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:4946:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hash = ZBX_DEFAULT_STRING_HASH_ALGO(func->function, strlen(func->function), hash);
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:4947:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hash = ZBX_DEFAULT_STRING_HASH_ALGO(func->parameter, strlen(func->parameter), hash);
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:5616:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			replace_to_alloc = strlen(replace_to) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:5700:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (sz != strlen(replace_to))
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:5715:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		data_alloc = data_len = strlen(*data) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:5717:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				token->loc.r - token->loc.l + 1, replace_to, strlen(replace_to));
data/zabbix-5.0.5+dfsg/src/libs/zbxserver/expression.c:6338:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (NULL == (doc = xmlReadMemory(*data, strlen(*data), "noname.xml", NULL, 0)))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/common.c:137:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			__func__, command, (zbx_fs_size_t)strlen(cmd_result), cmd_result);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dir.c:183:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ('\0' != *(*dir + 1) && ':' != *(*dir + strlen(*dir) - 2))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dir.c:237:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (tmp = template_list; '\0' != *tmp; tmp += strlen(tmp) + 1)
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dir.c:538:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	dir_len = strlen(dir);	/* store this value before giving away pointer ownership */
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dir.c:715:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	dir_len = strlen(dir);	/* store this value before giving away pointer ownership */
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dir.c:884:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	dir_len = strlen(dir);	/* store this value before giving away pointer ownership */
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/dir.c:1061:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	dir_len = strlen(dir);	/* store this value before giving away pointer ownership */
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/file.c:670:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while (0 < (nbytes = (int)read(f, buf, sizeof(buf))))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/common/file.c:809:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while (0 < (nr = (int)read(f, buf, sizeof(buf))))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/hpux/net.c:344:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size_t	if_name_sz = strlen(if_name) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/diskio.c:346:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
								p = tmp + strlen(tmp) - 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:84:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		c += strlen(c);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/hardware.c:159:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		while (0 != (nbytes = read(fd, smbuf + smbios_len, file_buf.st_size - smbios_len)))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:303:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while (0 != (n = read(fd, *buffer + offset, *buffer_alloc - offset)))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/net.c:386:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while (0 != (n = read(fd, *buffer + offset, *buffer_alloc - offset)))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:266:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	label_len = strlen(label);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:271:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		guard_len = strlen(guard);
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:860:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	n = read(fd, tmp, sizeof(tmp));
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:910:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while (0 < (n = read(fd, *cmdline + *cmdline_nbytes, cmdline_alloc - *cmdline_nbytes)))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/proc.c:1026:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (-1 == (n = read(fd, tmp, sizeof(tmp) - 1)))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:112:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			buf[strlen(buf) - 1] = '\0';
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:444:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (ZBX_DO_ONE != do_task && 0 != isdigit(name[strlen(name) - 1]))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/linux/sensors.c:447:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (ZBX_DO_ONE != do_task && 0 == isalpha(name[strlen(name) - 1]))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/openbsd/sensors.c:80:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (0 == strncmp(name, sensor_type_s[i], len = strlen(sensor_type_s[i])))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:249:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	n = read(fd, psinfo, sizeof(*psinfo));
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:747:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	n = read(fd, &psinfo, sizeof(psinfo));
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/solaris/proc.c:760:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	n = read(fd, &prusage, sizeof(prusage));
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:175:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (1 == get_rparams_num(&request) && 0 == strcmp("[*]", itemkey + strlen(get_rkey(&request))))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:631:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	empty_arguments = (1 == request->nparam && 0 == strlen(request->params[0]));
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:1542:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (0 != (sz_src = strlen(*param)) && '\\' == (*param)[sz_src - 1])
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:1650:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		value_len = strlen(*pvalue) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/sysinfo.c:1828:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while (0 != (n = read(fds[0], buffer, sizeof(buffer))))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskspace.c:55:37:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			filename, line, (zbx_fs_size_t)((wcslen(str) + 1) * sizeof(wchar_t)));
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskspace.c:182:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (0 < (sz = strlen(*fsname)) && '\\' == (*fsname)[--sz])
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskspace.c:186:23:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (MAX_PATH < (sz = wcslen(path) + 1) && 0 != wcsncmp(path, L"\\\\?\\", 4))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskspace.c:274:24:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (p = buffer, sz = wcslen(p); sz > 0; p += sz + 1, sz = wcslen(p))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskspace.c:274:61:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (p = buffer, sz = wcslen(p); sz > 0; p += sz + 1, sz = wcslen(p))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskspace.c:298:25:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		for (p = buffer, sz = wcslen(p); sz > 0; p += sz + 1, sz = wcslen(p))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskspace.c:298:62:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		for (p = buffer, sz = wcslen(p); sz > 0; p += sz + 1, sz = wcslen(p))
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/diskspace.c:415:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (0 < (sz = strlen(mpoint_local.fsname)) && '\\' == mpoint_local.fsname[--sz])
data/zabbix-5.0.5+dfsg/src/libs/zbxsysinfo/win32/pdhmon.c:219:62:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		for (instance = inst_list; L'\0' != *instance; instance += wcslen(instance) + 1)
data/zabbix-5.0.5+dfsg/src/libs/zbxtasks/task.c:1059:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	data = zbx_tm_data_create(parent_taskid, str, strlen(str), type);
data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:549:18:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	counter_base += wcslen(counter_base) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:550:18:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	counter_base += wcslen(counter_base) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:553:72:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (counter_text = counter_base; 0 != *counter_text; counter_text += wcslen(counter_text) + 1)
data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:556:19:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		counter_text += wcslen(counter_text) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:573:72:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (counter_text = counter_base; 0 != *counter_text; counter_text += wcslen(counter_text) + 1)
data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/perfmon.c:576:19:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		counter_text += wcslen(counter_text) + 1;
data/zabbix-5.0.5+dfsg/src/libs/zbxwin32/service.c:225:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			(DWORD)(wcslen(execName) + 1) * sizeof(wchar_t));
data/zabbix-5.0.5+dfsg/src/zabbix_agent/eventlog.c:1204:11:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			pCh += wcslen(pCh) + 1;
data/zabbix-5.0.5+dfsg/src/zabbix_agent/eventlog.c:1253:18:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					i++, pCh += wcslen(pCh) + 1)
data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:73:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	str_length = strlen(str);
data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:145:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	for (sz = strlen(filename) - 1, separator = &filename[sz]; separator >= filename; separator--)
data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:160:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sz = strlen(*directory);
data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:272:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (length != (rc = (int)read(f, buf, (size_t)length)))
data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:1854:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		nbytes = (int)read(fd, buf, (size_t)BUF_SIZE);
data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:2613:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (-1 == (nbytes = read(fd, buf, sizeof(buf))))
data/zabbix-5.0.5+dfsg/src/zabbix_agent/logfiles/logfiles.c:2657:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (-1 == (nbytes = read(fd, buf, sizeof(buf))))
data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:265:15:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	names_eng += wcslen(names_eng) + 1;
data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:266:15:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	names_eng += wcslen(names_eng) + 1;
data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:267:15:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	names_loc += wcslen(names_loc) + 1;
data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:268:15:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	names_loc += wcslen(names_loc) + 1;
data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:286:15:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sz = (DWORD)wcslen(object) + 1;
data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:299:62:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		for (loc_name = names_loc; L'\0' != *loc_name; loc_name += wcslen(loc_name) + 1)
data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:304:16:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			loc_name += wcslen(loc_name) + 1;
data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:313:62:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		for (eng_name = names_eng; L'\0' != *eng_name; eng_name += wcslen(eng_name) + 1)
data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:316:16:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			eng_name += wcslen(eng_name) + 1;
data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:867:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(eng_name);
data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:871:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (NULL != object_names[i].eng_name && len == strlen(object_names[i].eng_name) &&
data/zabbix-5.0.5+dfsg/src/zabbix_agent/perfstat.c:876:10:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			sz = (wcslen(object_names[i].loc_name) + 1) * sizeof(wchar_t);
data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.c:239:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size += ZBX_SIZE_T_ALIGN8(strlen(PROCSTAT_PTR(base, query->procname)) + 1);
data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.c:242:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size += ZBX_SIZE_T_ALIGN8(strlen(PROCSTAT_PTR(base, query->username)) + 1);
data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.c:245:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size += ZBX_SIZE_T_ALIGN8(strlen(PROCSTAT_PTR(base, query->cmdline)) + 1);
data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.c:336:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(str) + 1;
data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.c:504:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size += ZBX_SIZE_T_ALIGN8(strlen(procname) + 1);
data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.c:507:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size += ZBX_SIZE_T_ALIGN8(strlen(username) + 1);
data/zabbix-5.0.5+dfsg/src/zabbix_agent/procstat.c:510:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size += ZBX_SIZE_T_ALIGN8(strlen(cmdline) + 1);
data/zabbix-5.0.5+dfsg/src/zabbix_agent/zabbix_agentd.c:568:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (MAX_ZBX_HOSTNAME_LEN < strlen(*value))
data/zabbix-5.0.5+dfsg/src/zabbix_js/zabbix_js.c:130:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while (0 != (n = read(fd, buffer, sizeof(buffer))))
data/zabbix-5.0.5+dfsg/src/zabbix_proxy/proxy.c:452:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (MAX_ZBX_HOSTNAME_LEN < strlen(*value))
data/zabbix-5.0.5+dfsg/src/zabbix_proxy/servercomms.c:134:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (SUCCEED != zbx_tcp_send_ext(sock, j.buffer, strlen(j.buffer), ZBX_TCP_PROTOCOL | ZBX_TCP_COMPRESS, 0))
data/zabbix-5.0.5+dfsg/src/zabbix_proxy/servercomms.c:173:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (SUCCEED != zbx_tcp_send_ext(sock, j->buffer, strlen(j->buffer), ZBX_TCP_PROTOCOL | ZBX_TCP_COMPRESS, 0))
data/zabbix-5.0.5+dfsg/src/zabbix_sender/zabbix_sender.c:1329:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(tmp);
data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:2942:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				id_len = strlen(tmp);
data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:3236:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hash = ZBX_DEFAULT_STRING_HASH_ALGO(condition->value, strlen(condition->value), ZBX_DEFAULT_HASH_SEED);
data/zabbix-5.0.5+dfsg/src/zabbix_server/actions.c:3237:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hash = ZBX_DEFAULT_STRING_HASH_ALGO(condition->value2, strlen(condition->value2), hash);
data/zabbix-5.0.5+dfsg/src/zabbix_server/alerter/alerter.c:125:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	zbx_md5_append(&state, (const md5_byte_t *)sendto, strlen(sendto));
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:247:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (NULL != tag_filter->tag && 0 != strlen(tag_filter->tag))
data/zabbix-5.0.5+dfsg/src/zabbix_server/escalator/escalator.c:251:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (NULL != tag_filter->value && 0 != strlen(tag_filter->value))
data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httpmacro.c:303:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (FAIL == httpmacro_append_pair(httptest, key, strlen(key), value, strlen(value), data, err_str))
data/zabbix-5.0.5+dfsg/src/zabbix_server/httppoller/httpmacro.c:303:72:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (FAIL == httpmacro_append_pair(httptest, key, strlen(key), value, strlen(value), data, err_str))
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:350:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	offset = strlen(domain_name);
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:352:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (offset >= strlen(full_name) || 0 != strncmp(domain_name, full_name, offset))
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1522:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			(unsigned int)h->privilege, h->username, strlen(h->username),
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/checks_ipmi.c:1523:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			h->password, strlen(h->password), os_hnd, NULL, &h->con)))
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_protocol.c:38:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	addr_len = strlen(addr) + 1;
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_protocol.c:45:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	username_len = strlen(user) + 1;
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_protocol.c:46:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	password_len = strlen(pwd) + 1;
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_protocol.c:47:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	sensor_len = strlen(sensor) + 1;
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_protocol.c:48:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	key_len = NULL != key ? strlen(key) + 1 : 0;
data/zabbix-5.0.5+dfsg/src/zabbix_server/ipmi/ipmi_protocol.c:101:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	value_len = NULL != value ? strlen(value) + 1 : 0;
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld.c:446:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		id_len = strlen(id);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:1129:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if ('/' == *name || '/' == name[strlen(name) - 1])
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_host.c:1445:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(parent_rights->name) != offset)
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:1802:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		tmp_offset = strlen(tmp);
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:2591:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		params_alloc = strlen(param1) + strlen(param2) + 2;
data/zabbix-5.0.5+dfsg/src/zabbix_server/lld/lld_item.c:2591:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		params_alloc = strlen(param1) + strlen(param2) + 2;
data/zabbix-5.0.5+dfsg/src/zabbix_server/odbc/odbc.c:226:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (0 < (len = strlen(*connection_str)))
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_aggregate.c:283:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		quote_string(&group, strlen(group));
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_calculated.c:293:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			f->value = (char *)zbx_realloc(f->value, strlen(f->value) + 1);
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_http.c:301:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (FAIL == is_time_suffix(item->timeout, &timeout_seconds, strlen(item->timeout)))
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_simple_vmware.c:1936:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		ds_list[strlen(ds_list)-1] = '\0';
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_simple_vmware.c:2007:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		hv_list[strlen(hv_list)-1] = '\0';
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:114:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hash = ZBX_DEFAULT_STRING_HASH_ALGO(main_key->oid, strlen(main_key->oid), hash);
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:115:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hash = ZBX_DEFAULT_STRING_HASH_ALGO(main_key->community_context, strlen(main_key->community_context), hash);
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:116:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	hash = ZBX_DEFAULT_STRING_HASH_ALGO(main_key->security_name, strlen(main_key->security_name), hash);
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:478:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		session.community_len = strlen((char *)session.community);
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:485:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		session.securityNameLen = strlen(session.securityName);
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:491:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			session.contextNameLen = strlen(session.contextName);
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:526:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						strlen(item->snmpv3_authpassphrase), session.securityAuthKey,
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:560:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						strlen(item->snmpv3_authpassphrase), session.securityAuthKey,
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:591:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						strlen(item->snmpv3_privpassphrase), session.securityPrivKey,
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1045:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	root_string_len = strlen(oid_index);
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1055:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	root_numeric_len = strlen(oid_index);
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1620:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return ZBX_DEFAULT_STRING_HASH_ALGO(index, strlen(index), ZBX_DEFAULT_HASH_SEED);
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_snmp.c:1914:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				len = strlen(oids_translated[j]);
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_ssh.c:51:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		responses[0].length = strlen(password);
data/zabbix-5.0.5+dfsg/src/zabbix_server/poller/checks_ssh.c:123:77:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (NULL != (userauthlist = libssh2_userauth_list(session, item->username, strlen(item->username))))
data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.c:133:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	name_alloc = name_len = strlen(trigger->description) + 1;
data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.c:163:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						macro_len, macro, strlen(macro));
data/zabbix-5.0.5+dfsg/src/zabbix_server/postinit.c:181:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		name_alloc = name_len = strlen(trigger->description) + 1;
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:506:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	unescape_param(op_type, params, strlen(params), params_raw);
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:837:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(params);
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:951:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (NULL == (doc = xmlReadMemory(value->data.str, strlen(value->data.str), "noname.xml", NULL, 0)))
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:1347:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (NULL == (doc = xmlReadMemory(value_str.data.str, strlen(value_str.data.str), "noname.xml", NULL, 0)))
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:1529:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (FAIL == is_time_suffix(params, &timeout, strlen(params)))
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:1804:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	data_len = strlen(value->data.str);
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/item_preproc.c:2065:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len_replace = strlen(ptr + 1);
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preproc_worker.c:71:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		*value_str = zbx_malloc(NULL, (len = strlen(value_desc)) + 1);
data/zabbix-5.0.5+dfsg/src/zabbix_server/preprocessor/preprocessing.c:102:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				field_size = (NULL != fields[i].value) ? strlen((const char *)fields[i].value) + 1 : 0;
data/zabbix-5.0.5+dfsg/src/zabbix_server/snmptrapper/snmptrapper.c:445:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (-1 == (nbytes = read(trap_fd, buffer + offset, MAX_BUFFER_LEN - offset - 1)))
data/zabbix-5.0.5+dfsg/src/zabbix_server/taskmanager/proxy_tasks.c:111:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				task->data = (void *)zbx_tm_data_create(parent_taskid, row[17], strlen(row[17]),
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/active.c:266:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(row[5]) != attr.psk_identity_len ||
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/proxyconfig.c:81:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (SUCCEED != zbx_tcp_send_ext(sock, j.buffer, strlen(j.buffer), flags, CONFIG_TRAPPER_TIMEOUT))
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/proxydata.c:60:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (SUCCEED == (ret = zbx_tcp_send_ext(sock, json.buffer, strlen(json.buffer), flags, 0)))
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/proxydata.c:169:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (SUCCEED != zbx_tcp_send_ext(sock, data, strlen(data), ZBX_TCP_PROTOCOL | ZBX_TCP_COMPRESS, CONFIG_TIMEOUT))
data/zabbix-5.0.5+dfsg/src/zabbix_server/trapper/trapper_preproc.c:115:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ('-' != *ptr || FAIL == is_time_suffix(ptr + 1, &delay, strlen(ptr + 1)))
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:359:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return ZBX_DEFAULT_STRING_HASH_ALGO(hv->uuid, strlen(hv->uuid), ZBX_DEFAULT_HASH_SEED);
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:375:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return ZBX_DEFAULT_STRING_HASH_ALGO(vmi->vm->uuid, strlen(vmi->vm->uuid), ZBX_DEFAULT_HASH_SEED);
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:423:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sz = REFCOUNT_FIELD_SIZE + strlen(str) + 1;
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:462:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				*len = REFCOUNT_FIELD_SIZE + strlen(str) + 1 + ZBX_HASHSET_ENTRY_OFFSET;
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:668:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return ZBX_DEFAULT_STRING_HASH_ALGO(counter->path, strlen(counter->path), ZBX_DEFAULT_HASH_SEED);
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:690:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	seed = ZBX_DEFAULT_STRING_HASH_ALGO(entity->type, strlen(entity->type), ZBX_DEFAULT_HASH_SEED);
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:692:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	return ZBX_DEFAULT_STRING_HASH_ALGO(entity->id, strlen(entity->id), seed);
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:2742:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(path);
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:4583:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	service->minor_version = atoi(strlen(UNPARSED_SERVICE_MAJOR_VERSION_DELIM) + version_without_major);
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:4917:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					events_sz -= zbx_mem_required_chunk_size(strlen(event->message) +
data/zabbix-5.0.5+dfsg/src/zabbix_server/vmware/vmware.c:6087:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (NULL == (*xdoc = xmlReadMemory(data, (0 == len ? strlen(data) : len), ZBX_VM_NONAME_XML, NULL,

ANALYSIS SUMMARY:

Hits = 1794
Lines analyzed = 379918 in approximately 10.17 seconds (37372 lines/second)
Physical Source Lines of Code (SLOC) = 250226
Hits@level = [0]  99 [1] 400 [2] 1317 [3]   8 [4]  66 [5]   3
Hits@level+ = [0+] 1893 [1+] 1794 [2+] 1394 [3+]  77 [4+]  69 [5+]   3
Hits/KSLOC@level+ = [0+] 7.56516 [1+] 7.16952 [2+] 5.57096 [3+] 0.307722 [4+] 0.275751 [5+] 0.0119892
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.